A large study on the effect of code obfuscation on the quality of java code
Context : Obfuscation is a common technique used to protect software against malicious reverse engineering. Obfuscators manipulate the source code to make it harder to analyze and more difficult to understand for the attacker. Although different obfuscation algorithms and implementations are availab...
Saved in:
Published in | Empirical software engineering : an international journal Vol. 20; no. 6; pp. 1486 - 1524 |
---|---|
Main Authors | , , , |
Format | Journal Article |
Language | English |
Published |
New York
Springer US
01.12.2015
Springer Nature B.V |
Subjects | |
Online Access | Get full text |
Cover
Loading…
Abstract | Context
: Obfuscation is a common technique used to protect software against malicious reverse engineering. Obfuscators manipulate the source code to make it harder to analyze and more difficult to understand for the attacker. Although different obfuscation algorithms and implementations are available, they have never been directly compared in a large scale study.
Aim
: This paper aims at evaluating and quantifying the effect of several different obfuscation implementations (both open source and commercial), to help developers and project managers to decide which algorithms to use.
Method
: In this study we applied 44 obfuscations to 18 subject applications covering a total of 4 millions lines of code. The effectiveness of these source code obfuscations has been measured using 10 code metrics, considering modularity, size and complexity of code.
Results
: Results show that some of the considered obfuscations are effective in making code metrics change substantially from original to obfuscated code, although this change (called potency of the obfuscation) is different on different metrics. In the paper we recommend which obfuscations to select, given the security requirements of the software to be protected. |
---|---|
AbstractList | Context: Obfuscation is a common technique used to protect software against malicious reverse engineering. Obfuscators manipulate the source code to make it harder to analyze and more difficult to understand for the attacker. Although different obfuscation algorithms and implementations are available, they have never been directly compared in a large scale study.Aim: This paper aims at evaluating and quantifying the effect of several different obfuscation implementations (both open source and commercial), to help developers and project managers to decide which algorithms to use.Method: In this study we applied 44 obfuscations to 18 subject applications covering a total of 4 millions lines of code. The effectiveness of these source code obfuscations has been measured using 10 code metrics, considering modularity, size and complexity of code.Results: Results show that some of the considered obfuscations are effective in making code metrics change substantially from original to obfuscated code, although this change (called potency of the obfuscation) is different on different metrics. In the paper we recommend which obfuscations to select, given the security requirements of the software to be protected. Context : Obfuscation is a common technique used to protect software against malicious reverse engineering. Obfuscators manipulate the source code to make it harder to analyze and more difficult to understand for the attacker. Although different obfuscation algorithms and implementations are available, they have never been directly compared in a large scale study. Aim : This paper aims at evaluating and quantifying the effect of several different obfuscation implementations (both open source and commercial), to help developers and project managers to decide which algorithms to use. Method : In this study we applied 44 obfuscations to 18 subject applications covering a total of 4 millions lines of code. The effectiveness of these source code obfuscations has been measured using 10 code metrics, considering modularity, size and complexity of code. Results : Results show that some of the considered obfuscations are effective in making code metrics change substantially from original to obfuscated code, although this change (called potency of the obfuscation) is different on different metrics. In the paper we recommend which obfuscations to select, given the security requirements of the software to be protected. |
Author | Capiluppi, Andrea Boldyreff, Cornelia Ceccato, Mariano Falcarin, Paolo |
Author_xml | – sequence: 1 givenname: Mariano surname: Ceccato fullname: Ceccato, Mariano email: ceccato@fbk.eu organization: Fondazione Bruno Kessler–IRST – sequence: 2 givenname: Andrea surname: Capiluppi fullname: Capiluppi, Andrea organization: Brunel University – sequence: 3 givenname: Paolo surname: Falcarin fullname: Falcarin, Paolo organization: University of East London – sequence: 4 givenname: Cornelia surname: Boldyreff fullname: Boldyreff, Cornelia organization: University of Greenwich |
BookMark | eNp9kE1LAzEQhoNUsK3-AG8Bz9F8bJLNsRS_sOBFzyFNk7pl3bRJVth_7263IAh6moF53pl53xmYNKFxAFwTfEswlneJYCEKhEmBFKME4TMwJVwyJAURk75nJUWMcnEBZintMMZKFnwKXhawNnHrYMrtpoOhgfnDQee9sxkGD23YOBjWvk3W5Kofn4hDa-oqdwOyM1_myF2Cc2_q5K5OdQ7eH-7flk9o9fr4vFyskGVcZeSV4qpU0hpO3ZobbL3DjuJSMksKQ4kUXBJK16VlpVKSKCZVwYihTkpuMZuDm3HvPoZD61LWu9DGpj-pe4OFUCWnZU_JkbIxpBSd17bKRw85mqrWBOshOT0mp_vk9JCcHvaTX8p9rD5N7P7V0FGTerbZuvjz09-ib1c_f6c |
CitedBy_id | crossref_primary_10_1007_s11390_018_1864_x crossref_primary_10_3390_app14125056 crossref_primary_10_1145_3702314 crossref_primary_10_1016_j_jss_2018_12_025 crossref_primary_10_1109_ACCESS_2023_3341224 crossref_primary_10_32628_CSEIT2390376 crossref_primary_10_1007_s10664_019_09738_1 crossref_primary_10_1109_ACCESS_2021_3094517 crossref_primary_10_1016_j_infsof_2018_07_007 crossref_primary_10_1007_s10664_018_9625_6 crossref_primary_10_1016_j_cose_2017_10_004 |
Cites_doi | 10.1109/CSMR.2001.914965 10.1109/MSECP.2003.1219058 10.1109/MS.2011.34 10.1109/TSE.1976.233837 10.1007/978-3-540-30144-8_36 10.1002/spe.371 10.1145/1456362.1456371 10.1016/j.cose.2005.11.002 10.1109/ICPC.2009.5090041 10.1109/32.295895 10.1145/1314257.1314263 10.1007/978-1-4615-4625-2 10.1109/TSE.2002.1027797 10.1007/s10664-013-9248-x 10.1016/0167-4048(93)90054-9 10.1007/3-540-44456-4_7 10.4304/jmm.6.4.329-340 10.1145/948109.948149 |
ContentType | Journal Article |
Copyright | Springer Science+Business Media New York 2014 Springer Science+Business Media New York 2014. |
Copyright_xml | – notice: Springer Science+Business Media New York 2014 – notice: Springer Science+Business Media New York 2014. |
DBID | AAYXX CITATION 7SC 8FD 8FE 8FG ABJCF AFKRA ARAPS BENPR BGLVJ CCPQU DWQXO HCIFZ JQ2 L6V L7M L~C L~D M7S P5Z P62 PHGZM PHGZT PKEHL PQEST PQGLB PQQKQ PQUKI PRINS PTHSS S0W |
DOI | 10.1007/s10664-014-9321-0 |
DatabaseName | CrossRef Computer and Information Systems Abstracts Technology Research Database ProQuest SciTech Collection ProQuest Technology Collection Materials Science & Engineering Collection ProQuest Central UK/Ireland Advanced Technologies & Aerospace Collection ProQuest Central Technology Collection ProQuest One Community College ProQuest Central SciTech Premium Collection ProQuest Computer Science Collection ProQuest Engineering Collection Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Academic Computer and Information Systems Abstracts Professional Engineering Database Advanced Technologies & Aerospace Database ProQuest Advanced Technologies & Aerospace Collection ProQuest Central Premium ProQuest One Academic ProQuest One Academic Middle East (New) ProQuest One Academic Eastern Edition (DO NOT USE) ProQuest One Applied & Life Sciences ProQuest One Academic ProQuest One Academic UKI Edition ProQuest Central China Engineering Collection DELNET Engineering & Technology Collection |
DatabaseTitle | CrossRef Technology Collection Technology Research Database Computer and Information Systems Abstracts – Academic ProQuest One Academic Middle East (New) ProQuest Advanced Technologies & Aerospace Collection ProQuest Computer Science Collection Computer and Information Systems Abstracts SciTech Premium Collection ProQuest One Community College ProQuest Central China ProQuest Central ProQuest One Applied & Life Sciences ProQuest Engineering Collection ProQuest Central Korea ProQuest Central (New) Advanced Technologies Database with Aerospace Engineering Collection Advanced Technologies & Aerospace Collection Engineering Database ProQuest One Academic Eastern Edition ProQuest Technology Collection ProQuest SciTech Collection Computer and Information Systems Abstracts Professional Advanced Technologies & Aerospace Database ProQuest One Academic UKI Edition ProQuest DELNET Engineering and Technology Collection Materials Science & Engineering Collection ProQuest One Academic ProQuest One Academic (New) |
DatabaseTitleList | Technology Collection |
Database_xml | – sequence: 1 dbid: 8FG name: ProQuest Technology Collection url: https://search.proquest.com/technologycollection1 sourceTypes: Aggregation Database |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Computer Science |
EISSN | 1573-7616 |
EndPage | 1524 |
ExternalDocumentID | 10_1007_s10664_014_9321_0 |
GroupedDBID | -4Z -59 -5G -BR -EM -Y2 -~C .86 .DC .VR 06D 0R~ 0VY 199 1N0 1SB 2.D 203 28- 29G 2J2 2JN 2JY 2KG 2LR 2P1 2VQ 2~H 30V 4.4 406 408 409 40D 40E 5GY 5QI 5VS 67Z 6NX 78A 8FE 8FG 8TC 8UJ 95- 95. 95~ 96X AABHQ AACDK AAHNG AAIAL AAJBT AAJKR AANZL AAOBN AARHV AARTL AASML AATNV AATVU AAUYE AAWCG AAYIU AAYOK AAYQN AAYTO AAYZH ABAKF ABBBX ABBXA ABDZT ABECU ABFTD ABFTV ABHLI ABHQN ABJCF ABJNI ABJOX ABKCH ABKTR ABMNI ABMQK ABNWP ABQBU ABQSL ABSXP ABTEG ABTHY ABTKH ABTMW ABULA ABWNU ABXPI ACAOD ACBXY ACDTI ACGFS ACHSB ACHXU ACIWK ACKNC ACMDZ ACMLO ACOKC ACOMO ACPIV ACSNA ACZOJ ADHHG ADHIR ADIMF ADINQ ADKNI ADKPE ADRFC ADTPH ADURQ ADYFF ADZKW AEBTG AEFIE AEFQL AEGAL AEGNC AEJHL AEJRE AEKMD AEMSY AENEX AEOHA AEPYU AESKC AETLH AEVLU AEXYK AFBBN AFEXP AFGCZ AFKRA AFLOW AFQWF AFWTZ AFZKB AGAYW AGDGC AGGDS AGJBK AGMZJ AGQEE AGQMX AGRTI AGWIL AGWZB AGYKE AHAVH AHBYD AHKAY AHSBF AHYZX AIAKS AIGIU AIIXL AILAN AITGF AJBLW AJRNO AJZVZ ALMA_UNASSIGNED_HOLDINGS ALWAN AMKLP AMXSW AMYLF AMYQR AOCGG ARAPS ARMRJ ASPBG AVWKF AXYYD AYJHY AZFZN B-. BA0 BBWZM BDATZ BENPR BGLVJ BGNMA BSONS CAG CCPQU COF CS3 CSCUP DDRTE DL5 DNIVK DPUIP DU5 EBLON EBS EIOEI EJD ESBYG FEDTE FERAY FFXSO FIGPU FINBP FNLPD FRRFC FSGXE FWDCC GGCAI GGRSB GJIRD GNWQR GQ6 GQ7 GQ8 GXS H13 HCIFZ HF~ HG5 HG6 HMJXF HQYDN HRMNR HVGLF HZ~ I09 IHE IJ- IKXTQ ITM IWAJR IXC IZIGR IZQ I~X I~Z J-C J0Z JBSCW JCJTX JZLTJ KDC KOV KOW L6V LAK LLZTM M4Y M7S MA- N2Q NB0 NDZJH NPVJJ NQJWS NU0 O9- O93 O9G O9I O9J OAM P19 P62 P9O PF0 PT4 PT5 PTHSS Q2X QOK QOS R4E R89 R9I RHV RNI RNS ROL RPX RSV RZC RZE RZK S0W S16 S1Z S26 S27 S28 S3B SAP SCJ SCLPG SCO SDH SDM SHX SISQX SJYHP SNE SNPRN SNX SOHCF SOJ SPISZ SRMVM SSLCW STPWE SZN T13 T16 TSG TSK TSV TUC U2A UG4 UOJIU UTJUX UZXMN VC2 VFIZW W23 W48 WK8 YLTOR Z45 Z7R Z7S Z7V Z7X Z7Z Z81 Z83 Z86 Z88 Z8M Z8N Z8P Z8R Z8T Z8U Z8W Z92 ZMTXR ~EX AAPKM AAYXX ABBRH ABDBE ABFSG ACSTC ADHKG AEZWR AFDZB AFHIU AFOHR AGQPQ AHPBZ AHWEU AIXLP ATHPR AYFIA CITATION PHGZM PHGZT 7SC 8FD ABRTQ DWQXO JQ2 L7M L~C L~D PKEHL PQEST PQGLB PQQKQ PQUKI PRINS |
ID | FETCH-LOGICAL-c359t-f9959897ca52eb5a0cfe0e20873c14a217657122b8c3899719379431a2e775c03 |
IEDL.DBID | U2A |
ISSN | 1382-3256 |
IngestDate | Fri Jul 25 19:00:11 EDT 2025 Tue Jul 01 03:32:16 EDT 2025 Thu Apr 24 22:52:39 EDT 2025 Fri Feb 21 02:35:46 EST 2025 |
IsDoiOpenAccess | false |
IsOpenAccess | true |
IsPeerReviewed | true |
IsScholarly | true |
Issue | 6 |
Keywords | Subject Application Holm Correction Software Protection Code Metrics Cyclomatic Complexity |
Language | English |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-c359t-f9959897ca52eb5a0cfe0e20873c14a217657122b8c3899719379431a2e775c03 |
Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 |
OpenAccessLink | http://hdl.handle.net/10278/3746432 |
PQID | 2564698528 |
PQPubID | 326341 |
PageCount | 39 |
ParticipantIDs | proquest_journals_2564698528 crossref_citationtrail_10_1007_s10664_014_9321_0 crossref_primary_10_1007_s10664_014_9321_0 springer_journals_10_1007_s10664_014_9321_0 |
ProviderPackageCode | CITATION AAYXX |
PublicationCentury | 2000 |
PublicationDate | 20151200 2015-12-00 20151201 |
PublicationDateYYYYMMDD | 2015-12-01 |
PublicationDate_xml | – month: 12 year: 2015 text: 20151200 |
PublicationDecade | 2010 |
PublicationPlace | New York |
PublicationPlace_xml | – name: New York – name: Dordrecht |
PublicationSubtitle | An International Journal |
PublicationTitle | Empirical software engineering : an international journal |
PublicationTitleAbbrev | Empir Software Eng |
PublicationYear | 2015 |
Publisher | Springer US Springer Nature B.V |
Publisher_xml | – name: Springer US – name: Springer Nature B.V |
References | Wyseur B (2009) White-box cryptography. Ph.D. thesis, Katholieke Universiteit Leuven. http://www.cosic.esat.kuleuven.be/publications/talk-98.pdf Chidamber SR, Kemerer CF (1994) A metrics suite for object oriented design. IEEE Trans Softw Eng 20:476–493. doi:10.1109/32.295895. http://dl.acm.org/citation.cfm?id=630808.631131 Vasa R, Schneider J.g. (2003) Evolution of cyclomatic complexity in object oriented software. Proceedings of 7th ECOOP workshop on quantitative approaches in ObjectOriented software engineering QAOOSE, vol 03. http://www.it.swin.edu.au/personal/jschneider/Pub/qaoose03.pdf Collberg C, Thomborson C, Low D (1997) A taxonomy of obfuscating transformations. Tech Rep:148. http://www.cs.auckland.ac.nz/%7Ecollberg/Research/Publications/CollbergThomborsonLow97a/index.html ZengYLiuFLuoXYangCSoftware watermarking through obfuscated interpretation: Implementation nad analysisJ Multimed201164329339 Ceccato M, Penta M, Falcarin P, Ricca F, Torchiano M, Tonella P A family of experiments to assess the effectiveness and efficiency of source code obfuscation techniques. Empirical software engineeringpp. 1-35 (2013). doi:10.1007/s10664-013-9248-x Falcarin P, Collberg C, Atallah M, Jakubowski M (2011) Guest editors’ introduction:software protection. IEEE Softw 28:24–27. doi:10.1109/MS.2011.34. doi:10.1109/MS.2011.34 BasiliVBriandLMeloWA validation of object-oriented design metrics as quality indicators. Software engineeringIEEE Trans19962210751761 Sheskin D (2007) Handbook of parametric and nonparametric statistical procedures (4th Ed.). Chapman & All Collberg CS, Thomborson C (2002) Watermarking, tamper-proofing, and obfuscation: tools for software protection. IEEE Trans Softw Eng 28:735–746. doi:10.1109/TSE.2002.1027797. http://dl.acm.org/citation.cfm?id=636196.636198 Ceccato M, Di Penta M, Nagra J, Falcarin P, Ricca F, Torchiano M, Tonella P Towards experimental evaluation of code obfuscation techniques. In:proceedings of the 4th ACM workshop on quality of protection, QoP ’08, pp. 39–46. ACM, New York, NY, USA (2008). doi:10.1145/1456362.1456371 Anckaert B, Madou M, De Sutter B, De Bus B, De Bosschere K, Preneel B (2007) Program obfuscation: a quantitative approach. In: Proceedings of the 2007 ACM workshop on quality of protection, QoP ’07,pp. 15-20. ACM, New York, NY, USA. doi:10.1145/1314257.1314263 Ceccato M, Capiluppi A, Falcarin P, Boldyreff C (2013) A large study on the effect of code obfuscation on the quality of java code: Detailed analysis of data. Tech. rep., FBK, TR-FBK-SE-2013-3,. http://se.fbk.eu/sites/se.fbk.eu/files/TR-FBK-SE-2013-3.pdf Kouznetsov P Jad - the fast JAva Decompiler. http://www.kpdus.com/jad.html Jakubowski MH, Saw CW, Venkatesan R (2009) Iterated transformations and quantitative metrics for software protection. In: SECRYPT Udupa SK, Debray SK, Madou M Deobfuscation:reverse engineering obfuscated code. In:proceedings of the 12th Working conference on reverse engineering, pp. 45–54. IEEE Computer Society, Washington, DC, USA (2005). http://dl.acm.org/citation.cfm?id=1107841.1108171 Wohlin C, Runeson P, Höst M, Ohlsson M, Regnell B, Wesslén A (2000) Experimentation in software engineering - an introduction, Kluwer Academic Publishers Cohen FB (1993) Operating system protection through program evolution. Comput Secur 12:565–584. doi:10.1016/0167-4048(93)90054-9. http://dl.acm.org/citation.cfm?id=179007.179012 Collberg C, Myles G, Huntwork A (2003) Sandmark–a tool for software protection research. IEEE Secur Priv 1:40–49. doi:10.1109/MSECP.2003.1219058. http://dl.acm.org/citation.cfm?id=939830.939941 Visaggio CA, Pagin GA, Canfora G (2013) An empirical study of metric-based methods to detect obfuscated code. Int J Secur & Appl 7(2):59 Heffner K, Collberg C (2004) The obfuscation executive. In:Information security. Springer, pp 428–440 Jureczko M, Spinellis D (2010) Using object-oriented design metrics to predict software defects, monographs of system dependability, vol. models and methodology of system dependability, pp. 69–81. Oficyna Wydawnicza Politechniki Wroclawskiej, Wroclaw, Poland McCabe TJ (1976) A complexity measure. IEEE Trans Softw Eng:308–320 Karnick M, MacBride J, McGinnis S, Tang Y, Ramachandran R (2006) A qualitative analysis of java obfuscation. In: proceedings of 10th IASTED international conference on software engineering and applications, Dallas TX, USA Goto H, Mambo M, Matsumura K, Shizuya H (2000) An approach to the objective and quantitative evaluation of tamper-resistant software, In: Proceedings of the third international workshop on information security, ISW ’00. Springer-Verlag, London, UK, pp 82–96. http://dl.acm.org/citation.cfm?id=648024.744206 Lv Z, Ri S, Uhvhdufk DE, Dw D, Wkh Y, Ri X, Srsxodu W, Zrun QDS, Vkrzhg ZH (2005) On the relationship between cyclomatic complexity and oo ness, 9th ECOOP workshop on quantitative approaches in ObjectOriented software engineering Linn C, Debray S (2003) Obfuscation of executable code to improve resistance to static disassembly. In: Proceedings of the 10th ACM conference on computer and communications security, CCS ’03,pp. 290–299. ACM, New York, NY, USA. doi:10.1145/948109.948149 Hosking AL, Nystrom N, Whitlock D, Cutts Q, Diwan A (2001) Partial redundancy elimination for access path expressions. Software:practice and experience, vol 31. doi:10.1002/spe.371 Simon F, Steinbrückner F, Lewerentz C (2001) Metrics based refactoring. In: Proceedings of the Fifth European Conference on software maintenance and Reengineering, CSMR ’01, pp. 30-. IEEE Computer Society, Washington, DC, USA. http://dl.acm.org/citation.cfm?id=794203.795287 SutherlandIKalbGEBlythAMulleyGAn empirical examination of the reverse engineering process for binary filesComput & Secur200625322122810.1016/j.cose.2005.11.002 Ceccato M, Penta MD, Nagra J, Falcarin P, Ricca F, Torchiano M, Tonella P (2009) The effectiveness of source code obfuscation: An experimental assessment. In: ICPC. IEEE Comput Soc:178–187 I Sutherland (9321_CR25) 2006; 25 9321_CR1 9321_CR4 9321_CR3 9321_CR26 9321_CR27 9321_CR28 9321_CR29 V Basili (9321_CR2) 1996; 22 9321_CR20 9321_CR21 9321_CR22 9321_CR23 Y Zeng (9321_CR31) 2011; 6 9321_CR24 9321_CR6 9321_CR14 9321_CR5 9321_CR15 9321_CR8 9321_CR16 9321_CR7 9321_CR17 9321_CR18 9321_CR9 9321_CR19 9321_CR30 9321_CR10 9321_CR11 9321_CR12 9321_CR13 |
References_xml | – reference: Collberg C, Myles G, Huntwork A (2003) Sandmark–a tool for software protection research. IEEE Secur Priv 1:40–49. doi:10.1109/MSECP.2003.1219058. http://dl.acm.org/citation.cfm?id=939830.939941 – reference: Jakubowski MH, Saw CW, Venkatesan R (2009) Iterated transformations and quantitative metrics for software protection. In: SECRYPT – reference: Ceccato M, Di Penta M, Nagra J, Falcarin P, Ricca F, Torchiano M, Tonella P Towards experimental evaluation of code obfuscation techniques. In:proceedings of the 4th ACM workshop on quality of protection, QoP ’08, pp. 39–46. ACM, New York, NY, USA (2008). doi:10.1145/1456362.1456371 – reference: Goto H, Mambo M, Matsumura K, Shizuya H (2000) An approach to the objective and quantitative evaluation of tamper-resistant software, In: Proceedings of the third international workshop on information security, ISW ’00. Springer-Verlag, London, UK, pp 82–96. http://dl.acm.org/citation.cfm?id=648024.744206 – reference: McCabe TJ (1976) A complexity measure. IEEE Trans Softw Eng:308–320 – reference: Vasa R, Schneider J.g. (2003) Evolution of cyclomatic complexity in object oriented software. Proceedings of 7th ECOOP workshop on quantitative approaches in ObjectOriented software engineering QAOOSE, vol 03. http://www.it.swin.edu.au/personal/jschneider/Pub/qaoose03.pdf – reference: Ceccato M, Penta M, Falcarin P, Ricca F, Torchiano M, Tonella P A family of experiments to assess the effectiveness and efficiency of source code obfuscation techniques. Empirical software engineeringpp. 1-35 (2013). doi:10.1007/s10664-013-9248-x – reference: Ceccato M, Penta MD, Nagra J, Falcarin P, Ricca F, Torchiano M, Tonella P (2009) The effectiveness of source code obfuscation: An experimental assessment. In: ICPC. IEEE Comput Soc:178–187 – reference: Wyseur B (2009) White-box cryptography. Ph.D. thesis, Katholieke Universiteit Leuven. http://www.cosic.esat.kuleuven.be/publications/talk-98.pdf – reference: Collberg CS, Thomborson C (2002) Watermarking, tamper-proofing, and obfuscation: tools for software protection. IEEE Trans Softw Eng 28:735–746. doi:10.1109/TSE.2002.1027797. http://dl.acm.org/citation.cfm?id=636196.636198 – reference: SutherlandIKalbGEBlythAMulleyGAn empirical examination of the reverse engineering process for binary filesComput & Secur200625322122810.1016/j.cose.2005.11.002 – reference: Ceccato M, Capiluppi A, Falcarin P, Boldyreff C (2013) A large study on the effect of code obfuscation on the quality of java code: Detailed analysis of data. Tech. rep., FBK, TR-FBK-SE-2013-3,. http://se.fbk.eu/sites/se.fbk.eu/files/TR-FBK-SE-2013-3.pdf – reference: Chidamber SR, Kemerer CF (1994) A metrics suite for object oriented design. IEEE Trans Softw Eng 20:476–493. doi:10.1109/32.295895. http://dl.acm.org/citation.cfm?id=630808.631131 – reference: Karnick M, MacBride J, McGinnis S, Tang Y, Ramachandran R (2006) A qualitative analysis of java obfuscation. In: proceedings of 10th IASTED international conference on software engineering and applications, Dallas TX, USA – reference: BasiliVBriandLMeloWA validation of object-oriented design metrics as quality indicators. Software engineeringIEEE Trans19962210751761 – reference: Sheskin D (2007) Handbook of parametric and nonparametric statistical procedures (4th Ed.). Chapman & All – reference: Hosking AL, Nystrom N, Whitlock D, Cutts Q, Diwan A (2001) Partial redundancy elimination for access path expressions. Software:practice and experience, vol 31. doi:10.1002/spe.371 – reference: Cohen FB (1993) Operating system protection through program evolution. Comput Secur 12:565–584. doi:10.1016/0167-4048(93)90054-9. http://dl.acm.org/citation.cfm?id=179007.179012 – reference: Collberg C, Thomborson C, Low D (1997) A taxonomy of obfuscating transformations. Tech Rep:148. http://www.cs.auckland.ac.nz/%7Ecollberg/Research/Publications/CollbergThomborsonLow97a/index.html – reference: Heffner K, Collberg C (2004) The obfuscation executive. In:Information security. Springer, pp 428–440 – reference: Udupa SK, Debray SK, Madou M Deobfuscation:reverse engineering obfuscated code. In:proceedings of the 12th Working conference on reverse engineering, pp. 45–54. IEEE Computer Society, Washington, DC, USA (2005). http://dl.acm.org/citation.cfm?id=1107841.1108171 – reference: Visaggio CA, Pagin GA, Canfora G (2013) An empirical study of metric-based methods to detect obfuscated code. Int J Secur & Appl 7(2):59 – reference: Wohlin C, Runeson P, Höst M, Ohlsson M, Regnell B, Wesslén A (2000) Experimentation in software engineering - an introduction, Kluwer Academic Publishers – reference: Falcarin P, Collberg C, Atallah M, Jakubowski M (2011) Guest editors’ introduction:software protection. IEEE Softw 28:24–27. doi:10.1109/MS.2011.34. doi:10.1109/MS.2011.34 – reference: Linn C, Debray S (2003) Obfuscation of executable code to improve resistance to static disassembly. In: Proceedings of the 10th ACM conference on computer and communications security, CCS ’03,pp. 290–299. ACM, New York, NY, USA. doi:10.1145/948109.948149 – reference: Anckaert B, Madou M, De Sutter B, De Bus B, De Bosschere K, Preneel B (2007) Program obfuscation: a quantitative approach. In: Proceedings of the 2007 ACM workshop on quality of protection, QoP ’07,pp. 15-20. ACM, New York, NY, USA. doi:10.1145/1314257.1314263 – reference: Simon F, Steinbrückner F, Lewerentz C (2001) Metrics based refactoring. In: Proceedings of the Fifth European Conference on software maintenance and Reengineering, CSMR ’01, pp. 30-. IEEE Computer Society, Washington, DC, USA. http://dl.acm.org/citation.cfm?id=794203.795287 – reference: ZengYLiuFLuoXYangCSoftware watermarking through obfuscated interpretation: Implementation nad analysisJ Multimed201164329339 – reference: Kouznetsov P Jad - the fast JAva Decompiler. http://www.kpdus.com/jad.html – reference: Lv Z, Ri S, Uhvhdufk DE, Dw D, Wkh Y, Ri X, Srsxodu W, Zrun QDS, Vkrzhg ZH (2005) On the relationship between cyclomatic complexity and oo ness, 9th ECOOP workshop on quantitative approaches in ObjectOriented software engineering – reference: Jureczko M, Spinellis D (2010) Using object-oriented design metrics to predict software defects, monographs of system dependability, vol. models and methodology of system dependability, pp. 69–81. Oficyna Wydawnicza Politechniki Wroclawskiej, Wroclaw, Poland – ident: 9321_CR3 – ident: 9321_CR17 – ident: 9321_CR24 doi: 10.1109/CSMR.2001.914965 – ident: 9321_CR9 doi: 10.1109/MSECP.2003.1219058 – ident: 9321_CR12 doi: 10.1109/MS.2011.34 – ident: 9321_CR22 doi: 10.1109/TSE.1976.233837 – ident: 9321_CR19 – ident: 9321_CR21 – volume: 22 start-page: 751 issue: 10 year: 1996 ident: 9321_CR2 publication-title: IEEE Trans – ident: 9321_CR14 doi: 10.1007/978-3-540-30144-8_36 – ident: 9321_CR15 doi: 10.1002/spe.371 – ident: 9321_CR4 doi: 10.1145/1456362.1456371 – ident: 9321_CR26 – volume: 25 start-page: 221 issue: 3 year: 2006 ident: 9321_CR25 publication-title: Comput & Secur doi: 10.1016/j.cose.2005.11.002 – ident: 9321_CR6 doi: 10.1109/ICPC.2009.5090041 – ident: 9321_CR28 – ident: 9321_CR7 doi: 10.1109/32.295895 – ident: 9321_CR10 – ident: 9321_CR1 doi: 10.1145/1314257.1314263 – ident: 9321_CR29 doi: 10.1007/978-1-4615-4625-2 – ident: 9321_CR11 doi: 10.1109/TSE.2002.1027797 – ident: 9321_CR16 – ident: 9321_CR18 – ident: 9321_CR5 doi: 10.1007/s10664-013-9248-x – ident: 9321_CR8 doi: 10.1016/0167-4048(93)90054-9 – ident: 9321_CR13 doi: 10.1007/3-540-44456-4_7 – volume: 6 start-page: 329 issue: 4 year: 2011 ident: 9321_CR31 publication-title: J Multimed doi: 10.4304/jmm.6.4.329-340 – ident: 9321_CR30 – ident: 9321_CR23 – ident: 9321_CR27 – ident: 9321_CR20 doi: 10.1145/948109.948149 |
SSID | ssj0009745 |
Score | 2.2268012 |
Snippet | Context
: Obfuscation is a common technique used to protect software against malicious reverse engineering. Obfuscators manipulate the source code to make it... Context: Obfuscation is a common technique used to protect software against malicious reverse engineering. Obfuscators manipulate the source code to make it... |
SourceID | proquest crossref springer |
SourceType | Aggregation Database Enrichment Source Index Database Publisher |
StartPage | 1486 |
SubjectTerms | Algorithms Compilers Computer Science Interpreters Modularity Programming Languages Reverse engineering Software Software engineering Software Engineering/Programming and Operating Systems Source code |
SummonAdditionalLinks | – databaseName: ProQuest Central dbid: BENPR link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwfV3PS8MwFH7odvHib3E6JQdPSrBNm6Y9yZSNoTBEHOxWkiw5yFin2wT_e_Pa1KLgzn3N4b3kvS_Jy_cBXIWaKysTRlkoNY0jlVGVCkNNoq2OrWWRKrt8R8lwHD9O-MQfuC19W2WdE8tEPS00npHfutKMYoecpXeLd4qqUXi76iU0tqHtUnCatqB93x89vzS0u6KUKUaiPRq5Iep7zerxXJJgB0ZMHYZxe-rflamBm39uSMvCM9iHXY8YSa8K8QFsmfkh7NVqDMQvziN46pEZtnWTkjGWFHPisB2p-jVIYQk-XieFsutldUpXW1TPKr_Q5E1-ytLuGMaD_uvDkHqpBKojnq2oRdqwNBNacmYUl4G2JjAsSEWkw1i6fUfCRciYSjUS6gkH25AZLpTMCMF1EJ1Aa17MzSmQWChjjdWZTlQ8tcbVc6uFMCILpHXwogNB7aZcex5xlLOY5Q0DMno2d57N0bN50IHrn18WFYnGJuNu7fvcr6dl3kS_Azd1PJrP_w52tnmwc9hxAIhX7SldaK0-1ubCgYyVuvQz6Rurzswi priority: 102 providerName: ProQuest |
Title | A large study on the effect of code obfuscation on the quality of java code |
URI | https://link.springer.com/article/10.1007/s10664-014-9321-0 https://www.proquest.com/docview/2564698528 |
Volume | 20 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV09T8MwED3RdmHhG1EolQcmkKXEieNkDKgfolKFEJXKFNnGHlCVVLRF4t9jJzEBBEhMGXLxcBfn3sXv3gFc-JIKzSOCic8lDgORYBEzhVUktQy1JoEoWb7TaDwLb-d0Xvdxrxzb3R1Jll_qT81uUWQZEyE2mMPUwC3oUFO6Wx7XjKSN0i4rJxNbbT0cmITujjJ_WuJrMmoQ5rdD0TLXDPdgpwaJKK2iug9bKj-AXTeAAdX78RAmKVpYJjcqRWJRkSMD51BF0UCFRrZfHRVCb1bVjzlnUXVSvlmTZ_7KS7sjmA0HDzdjXE9HwDKgyRprqxQWJ0xySpSg3JNaeYp4MQukH3JTakSU-YSIWFoNPWaQmhWD8zlRjFHpBcfQzotcnQAKmVBaaZnISIRPWpkUriVjiiUe1wZRdMFzbspkLR1uJ1gsskb02Ho2M57NrGczrwuXH48sK92Mv4x7zvdZvYVWmQmdnW5JSdyFKxeP5vavi53-y_oMtg0EohVBpQft9ctGnRuYsRZ9aMXDUR866ehxMjDX68H07r5fvmzv5prLLw |
linkProvider | Springer Nature |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV3PM8QwFH7DOnDx21gWOXBhMtq0adqDMQZrWZyYcaskkoMxW-xi_FP-Rnlto8MMN-e-Zjovr3lfkve-D2Az1FxZmTDKQqlpHKmMqlQYahJtdWwti1RZ5XuZ9K7jsxt-MwYfvhcGyyr9mlgu1HeFxjPyXZeaUeyQs3T_8YmiahTernoJjSos-ub9zW3ZhnunR25-txjrHl8d9mitKkB1xLMRtciwlWZCS86M4jLQ1gSGBamIdBhLB9ETLkLGVKqRe044hIMkaqFkRgiug8iNOw4TceQyOXamd08akl9RiiIjrR-N3Af7W9SqVS9JsN4jpg4xuR389zzYgNsf97FlmuvOwnSNT8lBFVBzMGYG8zDjtR9IvRQsQP-APGAROSn5aUkxIA5Jkqo6hBSWYKs8KZR9GVZngt6iauJ8R5N7-SpLu0W4_hcXLkFrUAzMMpBYKGON1ZlOVHxnjUMPVgthRBZI68BMGwLvplzXrOUonvGQN3zL6NnceTZHz-ZBG7a_XnmsKDv-Mu543-f13zvMm1hrw46fj-bxr4Ot_D3YBkz2ri7O8_PTy_4qTDnoxavCmA60Rs8vZs3Bm5FaL2OKwO1_B_EngZoFDQ |
linkToPdf | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV1LS8QwEB50BfHiW1yfOehFCbZp07QHEV-LurKIKHirSUwOIlt1V8W_5q8z0zYWBb157nQok2nyJZn5PoCNUHNlZcIoC6WmcaQyqlJhqEm01bG1LFJllW8vObmOz274zQh8-F4YLKv0c2I5Ud8VGs_Id9zSjGKHnKU7ti6LuDjq7D0-UVSQwptWL6dRpUjXvL-57dtg9_TIjfUmY53jq8MTWisMUB3xbEgtsm2lmdCSM6O4DLQ1gWFBKiIdxtLB9YSLkDGVauShEw7tIKFaKJkRgusgcn5HYUzgrqgFYwfHvYvLhvJXlBLJSPJHI_f5_k61atxLEqz-iKnDT24__31VbKDuj9vZctHrTMNkjVbJfpVeMzBi-rMw5ZUgSD0xzEF3nzxgSTkp2WpJ0ScOV5KqVoQUlmDjPCmUfRlUJ4TeomrpfEeTe_kqS7t5uP6XIC5Aq1_0zSKQWChjjdWZTlR8Z43DElYLYUQWSOugTRsCH6Zc1xzmKKXxkDfsyxjZ3EU2x8jmQRu2vl55rAg8_jJe8bHP6395kDeZ14ZtPx7N41-dLf3tbB3GXQLn56e97jJMOBzGqyqZFWgNn1_MqsM6Q7VWJxWB2__O409fzwqf |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=A+large+study+on+the+effect+of+code+obfuscation+on+the+quality+of+java+code&rft.jtitle=Empirical+software+engineering+%3A+an+international+journal&rft.au=Ceccato%2C+Mariano&rft.au=Capiluppi%2C+Andrea&rft.au=Falcarin%2C+Paolo&rft.au=Boldyreff%2C+Cornelia&rft.date=2015-12-01&rft.pub=Springer+US&rft.issn=1382-3256&rft.eissn=1573-7616&rft.volume=20&rft.issue=6&rft.spage=1486&rft.epage=1524&rft_id=info:doi/10.1007%2Fs10664-014-9321-0&rft.externalDocID=10_1007_s10664_014_9321_0 |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1382-3256&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1382-3256&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1382-3256&client=summon |