• DocumentCode
    3599723
  • Title

    Code Artificiality: A Metric for the Code Stealth Based on an N-Gram Model

  • Author

    Kanzaki, Yuichiro ; Monden, Akito ; Collberg, Christian

  • Author_Institution
    Nat. Inst. of Technol., Kumamoto Coll., Kumamoto, Japan
  • fYear
    2015
  • Firstpage
    31
  • Lastpage
    37
  • Abstract
    This paper proposes a method for evaluating the artificiality of protected code by means of an N-gram model. The proposed artificiality metric helps us measure the stealth of the protected code, that is, the degree to which protected code can be distinguished from unprotected code. In a case study, we use the proposed method to evaluate the artificiality of programs that are transformed by well-known obfuscation techniques. The results show that static obfuscating transformations (e.g., Control flow flattening) have little effect on artificiality. However, dynamic obfuscating transformations (e.g., Code encryption), or a technique that inserts junk code fragments into the program, tend to increase the artificiality, which may have a significant impact on the stealth of the code.
  • Keywords
    security of data; N-gram model; code artificiality; code stealth; man-at-the-end attacks; program encryption; program obfuscation; Assembly; Computational modeling; Encoding; Encryption; Optimization; Software; Code Obfuscation; Code Stealth; Program Analysis; Software Protection;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Software Protection (SPRO), 2015 IEEE/ACM 1st International Workshop on
  • Type

    conf

  • DOI
    10.1109/SPRO.2015.14
  • Filename
    7174808