DocumentCode
3599723
Title
Code Artificiality: A Metric for the Code Stealth Based on an N-Gram Model
Author
Kanzaki, Yuichiro ; Monden, Akito ; Collberg, Christian
Author_Institution
Nat. Inst. of Technol., Kumamoto Coll., Kumamoto, Japan
fYear
2015
Firstpage
31
Lastpage
37
Abstract
This paper proposes a method for evaluating the artificiality of protected code by means of an N-gram model. The proposed artificiality metric helps us measure the stealth of the protected code, that is, the degree to which protected code can be distinguished from unprotected code. In a case study, we use the proposed method to evaluate the artificiality of programs that are transformed by well-known obfuscation techniques. The results show that static obfuscating transformations (e.g., Control flow flattening) have little effect on artificiality. However, dynamic obfuscating transformations (e.g., Code encryption), or a technique that inserts junk code fragments into the program, tend to increase the artificiality, which may have a significant impact on the stealth of the code.
Keywords
security of data; N-gram model; code artificiality; code stealth; man-at-the-end attacks; program encryption; program obfuscation; Assembly; Computational modeling; Encoding; Encryption; Optimization; Software; Code Obfuscation; Code Stealth; Program Analysis; Software Protection;
fLanguage
English
Publisher
ieee
Conference_Titel
Software Protection (SPRO), 2015 IEEE/ACM 1st International Workshop on
Type
conf
DOI
10.1109/SPRO.2015.14
Filename
7174808
Link To Document