Hybrid obfuscation technique to protect source code from prohibited software reverse engineering
In this research, a new Hybrid Obfuscation Technique was proposed to prevent prohibited Reverse Engineering. The proposed hybrid technique contains three approaches; first approach is string encryption. The string encryption is about adding a mathematical equation with arrays and loops to the strin...
Saved in:
Main Authors: | , , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
Institute of Electrical and Electronics Engineers
2020
|
Online Access: | http://psasir.upm.edu.my/id/eprint/89227/1/OBF.pdf http://psasir.upm.edu.my/id/eprint/89227/ https://ieeexplore.ieee.org/document/9211395 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
id |
my.upm.eprints.89227 |
---|---|
record_format |
eprints |
spelling |
my.upm.eprints.892272021-09-03T21:01:07Z http://psasir.upm.edu.my/id/eprint/89227/ Hybrid obfuscation technique to protect source code from prohibited software reverse engineering Al-Hakimi, Asma'a Mahfoud Hezam Md Sultan, Abu Bakar Abdul Ghani, Abdul Azim Mohd Ali, Norhayati Admodisastro, Novia Indriaty In this research, a new Hybrid Obfuscation Technique was proposed to prevent prohibited Reverse Engineering. The proposed hybrid technique contains three approaches; first approach is string encryption. The string encryption is about adding a mathematical equation with arrays and loops to the strings in the code to hide the meaning. Second approach is renaming system keywords to Unicode to increase the difficulty and complexity of the code. Third approach is transforming identifiers to junk code to hide the meaning and increase the complexity of the code. An experiment was conducted to evaluate the proposed Hybrid Obfuscation Technique. The experiment contains two phases; the first phase was conducting reverse engineering against java applications that do not use any protection to determine the ability of reversing tools to read the compiled code. The second phase was conducting reverse engineering against the proposed technique to evaluate the effectiveness of it. The experiment of the hybrid obfuscation technique was to test output correctness, syntax, reversed code errors, flow test, identifiers names test, methods, and classes correctness test. With these parameters, it was possible to determine the ability of the proposed technique to defend the attack. The experiment has presented good and promising results, where it was nearly impossible for the reversing tool to read the obfuscated code. Even the revealed code did not perform as well as original and obfuscated code. Institute of Electrical and Electronics Engineers 2020 Article PeerReviewed text en http://psasir.upm.edu.my/id/eprint/89227/1/OBF.pdf Al-Hakimi, Asma'a Mahfoud Hezam and Md Sultan, Abu Bakar and Abdul Ghani, Abdul Azim and Mohd Ali, Norhayati and Admodisastro, Novia Indriaty (2020) Hybrid obfuscation technique to protect source code from prohibited software reverse engineering. IEEE Access, 8. 187326 - 187342. ISSN 2169-3536 https://ieeexplore.ieee.org/document/9211395 10.1109/ACCESS.2020.3028428 |
institution |
Universiti Putra Malaysia |
building |
UPM Library |
collection |
Institutional Repository |
continent |
Asia |
country |
Malaysia |
content_provider |
Universiti Putra Malaysia |
content_source |
UPM Institutional Repository |
url_provider |
http://psasir.upm.edu.my/ |
language |
English |
description |
In this research, a new Hybrid Obfuscation Technique was proposed to prevent prohibited Reverse Engineering. The proposed hybrid technique contains three approaches; first approach is string
encryption. The string encryption is about adding a mathematical equation with arrays and loops to the strings in the code to hide the meaning. Second approach is renaming system keywords to Unicode to increase the difficulty and complexity of the code. Third approach is transforming identifiers to junk code to hide the meaning and increase the complexity of the code. An experiment was conducted to evaluate the proposed Hybrid Obfuscation Technique. The experiment contains two phases; the first phase was conducting reverse engineering against java applications that do not use any protection to determine the ability of reversing
tools to read the compiled code. The second phase was conducting reverse engineering against the proposed technique to evaluate the effectiveness of it. The experiment of the hybrid obfuscation technique was to test output correctness, syntax, reversed code errors, flow test, identifiers names test, methods, and classes
correctness test. With these parameters, it was possible to determine the ability of the proposed technique to defend the attack. The experiment has presented good and promising results, where it was nearly impossible for the reversing tool to read the obfuscated code. Even the revealed code did not perform as well as original and obfuscated code. |
format |
Article |
author |
Al-Hakimi, Asma'a Mahfoud Hezam Md Sultan, Abu Bakar Abdul Ghani, Abdul Azim Mohd Ali, Norhayati Admodisastro, Novia Indriaty |
spellingShingle |
Al-Hakimi, Asma'a Mahfoud Hezam Md Sultan, Abu Bakar Abdul Ghani, Abdul Azim Mohd Ali, Norhayati Admodisastro, Novia Indriaty Hybrid obfuscation technique to protect source code from prohibited software reverse engineering |
author_facet |
Al-Hakimi, Asma'a Mahfoud Hezam Md Sultan, Abu Bakar Abdul Ghani, Abdul Azim Mohd Ali, Norhayati Admodisastro, Novia Indriaty |
author_sort |
Al-Hakimi, Asma'a Mahfoud Hezam |
title |
Hybrid obfuscation technique to protect source code from prohibited software reverse engineering |
title_short |
Hybrid obfuscation technique to protect source code from prohibited software reverse engineering |
title_full |
Hybrid obfuscation technique to protect source code from prohibited software reverse engineering |
title_fullStr |
Hybrid obfuscation technique to protect source code from prohibited software reverse engineering |
title_full_unstemmed |
Hybrid obfuscation technique to protect source code from prohibited software reverse engineering |
title_sort |
hybrid obfuscation technique to protect source code from prohibited software reverse engineering |
publisher |
Institute of Electrical and Electronics Engineers |
publishDate |
2020 |
url |
http://psasir.upm.edu.my/id/eprint/89227/1/OBF.pdf http://psasir.upm.edu.my/id/eprint/89227/ https://ieeexplore.ieee.org/document/9211395 |
_version_ |
1710677174539780096 |
score |
13.211869 |