A large study on the effect of code obfuscation on the quality of java code

Context : Obfuscation is a common technique used to protect software against malicious reverse engineering. Obfuscators manipulate the source code to make it harder to analyze and more difficult to understand for the attacker. Although different obfuscation algorithms and implementations are availab...

Full description

Saved in:
Bibliographic Details
Published inEmpirical software engineering : an international journal Vol. 20; no. 6; pp. 1486 - 1524
Main Authors Ceccato, Mariano, Capiluppi, Andrea, Falcarin, Paolo, Boldyreff, Cornelia
Format Journal Article
LanguageEnglish
Published New York Springer US 01.12.2015
Springer Nature B.V
Subjects
Online AccessGet full text

Cover

Loading…
Abstract Context : Obfuscation is a common technique used to protect software against malicious reverse engineering. Obfuscators manipulate the source code to make it harder to analyze and more difficult to understand for the attacker. Although different obfuscation algorithms and implementations are available, they have never been directly compared in a large scale study. Aim : This paper aims at evaluating and quantifying the effect of several different obfuscation implementations (both open source and commercial), to help developers and project managers to decide which algorithms to use. Method : In this study we applied 44 obfuscations to 18 subject applications covering a total of 4 millions lines of code. The effectiveness of these source code obfuscations has been measured using 10 code metrics, considering modularity, size and complexity of code. Results : Results show that some of the considered obfuscations are effective in making code metrics change substantially from original to obfuscated code, although this change (called potency of the obfuscation) is different on different metrics. In the paper we recommend which obfuscations to select, given the security requirements of the software to be protected.
AbstractList Context: Obfuscation is a common technique used to protect software against malicious reverse engineering. Obfuscators manipulate the source code to make it harder to analyze and more difficult to understand for the attacker. Although different obfuscation algorithms and implementations are available, they have never been directly compared in a large scale study.Aim: This paper aims at evaluating and quantifying the effect of several different obfuscation implementations (both open source and commercial), to help developers and project managers to decide which algorithms to use.Method: In this study we applied 44 obfuscations to 18 subject applications covering a total of 4 millions lines of code. The effectiveness of these source code obfuscations has been measured using 10 code metrics, considering modularity, size and complexity of code.Results: Results show that some of the considered obfuscations are effective in making code metrics change substantially from original to obfuscated code, although this change (called potency of the obfuscation) is different on different metrics. In the paper we recommend which obfuscations to select, given the security requirements of the software to be protected.
Context : Obfuscation is a common technique used to protect software against malicious reverse engineering. Obfuscators manipulate the source code to make it harder to analyze and more difficult to understand for the attacker. Although different obfuscation algorithms and implementations are available, they have never been directly compared in a large scale study. Aim : This paper aims at evaluating and quantifying the effect of several different obfuscation implementations (both open source and commercial), to help developers and project managers to decide which algorithms to use. Method : In this study we applied 44 obfuscations to 18 subject applications covering a total of 4 millions lines of code. The effectiveness of these source code obfuscations has been measured using 10 code metrics, considering modularity, size and complexity of code. Results : Results show that some of the considered obfuscations are effective in making code metrics change substantially from original to obfuscated code, although this change (called potency of the obfuscation) is different on different metrics. In the paper we recommend which obfuscations to select, given the security requirements of the software to be protected.
Author Capiluppi, Andrea
Boldyreff, Cornelia
Ceccato, Mariano
Falcarin, Paolo
Author_xml – sequence: 1
  givenname: Mariano
  surname: Ceccato
  fullname: Ceccato, Mariano
  email: ceccato@fbk.eu
  organization: Fondazione Bruno Kessler–IRST
– sequence: 2
  givenname: Andrea
  surname: Capiluppi
  fullname: Capiluppi, Andrea
  organization: Brunel University
– sequence: 3
  givenname: Paolo
  surname: Falcarin
  fullname: Falcarin, Paolo
  organization: University of East London
– sequence: 4
  givenname: Cornelia
  surname: Boldyreff
  fullname: Boldyreff, Cornelia
  organization: University of Greenwich
BookMark eNp9kE1LAzEQhoNUsK3-AG8Bz9F8bJLNsRS_sOBFzyFNk7pl3bRJVth_7263IAh6moF53pl53xmYNKFxAFwTfEswlneJYCEKhEmBFKME4TMwJVwyJAURk75nJUWMcnEBZintMMZKFnwKXhawNnHrYMrtpoOhgfnDQee9sxkGD23YOBjWvk3W5Kofn4hDa-oqdwOyM1_myF2Cc2_q5K5OdQ7eH-7flk9o9fr4vFyskGVcZeSV4qpU0hpO3ZobbL3DjuJSMksKQ4kUXBJK16VlpVKSKCZVwYihTkpuMZuDm3HvPoZD61LWu9DGpj-pe4OFUCWnZU_JkbIxpBSd17bKRw85mqrWBOshOT0mp_vk9JCcHvaTX8p9rD5N7P7V0FGTerbZuvjz09-ib1c_f6c
CitedBy_id crossref_primary_10_1007_s11390_018_1864_x
crossref_primary_10_3390_app14125056
crossref_primary_10_1145_3702314
crossref_primary_10_1016_j_jss_2018_12_025
crossref_primary_10_1109_ACCESS_2023_3341224
crossref_primary_10_32628_CSEIT2390376
crossref_primary_10_1007_s10664_019_09738_1
crossref_primary_10_1109_ACCESS_2021_3094517
crossref_primary_10_1016_j_infsof_2018_07_007
crossref_primary_10_1007_s10664_018_9625_6
crossref_primary_10_1016_j_cose_2017_10_004
Cites_doi 10.1109/CSMR.2001.914965
10.1109/MSECP.2003.1219058
10.1109/MS.2011.34
10.1109/TSE.1976.233837
10.1007/978-3-540-30144-8_36
10.1002/spe.371
10.1145/1456362.1456371
10.1016/j.cose.2005.11.002
10.1109/ICPC.2009.5090041
10.1109/32.295895
10.1145/1314257.1314263
10.1007/978-1-4615-4625-2
10.1109/TSE.2002.1027797
10.1007/s10664-013-9248-x
10.1016/0167-4048(93)90054-9
10.1007/3-540-44456-4_7
10.4304/jmm.6.4.329-340
10.1145/948109.948149
ContentType Journal Article
Copyright Springer Science+Business Media New York 2014
Springer Science+Business Media New York 2014.
Copyright_xml – notice: Springer Science+Business Media New York 2014
– notice: Springer Science+Business Media New York 2014.
DBID AAYXX
CITATION
7SC
8FD
8FE
8FG
ABJCF
AFKRA
ARAPS
BENPR
BGLVJ
CCPQU
DWQXO
HCIFZ
JQ2
L6V
L7M
L~C
L~D
M7S
P5Z
P62
PHGZM
PHGZT
PKEHL
PQEST
PQGLB
PQQKQ
PQUKI
PRINS
PTHSS
S0W
DOI 10.1007/s10664-014-9321-0
DatabaseName CrossRef
Computer and Information Systems Abstracts
Technology Research Database
ProQuest SciTech Collection
ProQuest Technology Collection
Materials Science & Engineering Collection
ProQuest Central UK/Ireland
Advanced Technologies & Aerospace Collection
ProQuest Central
Technology Collection
ProQuest One Community College
ProQuest Central
SciTech Premium Collection
ProQuest Computer Science Collection
ProQuest Engineering Collection
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts – Academic
Computer and Information Systems Abstracts Professional
Engineering Database
Advanced Technologies & Aerospace Database
ProQuest Advanced Technologies & Aerospace Collection
ProQuest Central Premium
ProQuest One Academic
ProQuest One Academic Middle East (New)
ProQuest One Academic Eastern Edition (DO NOT USE)
ProQuest One Applied & Life Sciences
ProQuest One Academic
ProQuest One Academic UKI Edition
ProQuest Central China
Engineering Collection
DELNET Engineering & Technology Collection
DatabaseTitle CrossRef
Technology Collection
Technology Research Database
Computer and Information Systems Abstracts – Academic
ProQuest One Academic Middle East (New)
ProQuest Advanced Technologies & Aerospace Collection
ProQuest Computer Science Collection
Computer and Information Systems Abstracts
SciTech Premium Collection
ProQuest One Community College
ProQuest Central China
ProQuest Central
ProQuest One Applied & Life Sciences
ProQuest Engineering Collection
ProQuest Central Korea
ProQuest Central (New)
Advanced Technologies Database with Aerospace
Engineering Collection
Advanced Technologies & Aerospace Collection
Engineering Database
ProQuest One Academic Eastern Edition
ProQuest Technology Collection
ProQuest SciTech Collection
Computer and Information Systems Abstracts Professional
Advanced Technologies & Aerospace Database
ProQuest One Academic UKI Edition
ProQuest DELNET Engineering and Technology Collection
Materials Science & Engineering Collection
ProQuest One Academic
ProQuest One Academic (New)
DatabaseTitleList Technology Collection

Database_xml – sequence: 1
  dbid: 8FG
  name: ProQuest Technology Collection
  url: https://search.proquest.com/technologycollection1
  sourceTypes: Aggregation Database
DeliveryMethod fulltext_linktorsrc
Discipline Computer Science
EISSN 1573-7616
EndPage 1524
ExternalDocumentID 10_1007_s10664_014_9321_0
GroupedDBID -4Z
-59
-5G
-BR
-EM
-Y2
-~C
.86
.DC
.VR
06D
0R~
0VY
199
1N0
1SB
2.D
203
28-
29G
2J2
2JN
2JY
2KG
2LR
2P1
2VQ
2~H
30V
4.4
406
408
409
40D
40E
5GY
5QI
5VS
67Z
6NX
78A
8FE
8FG
8TC
8UJ
95-
95.
95~
96X
AABHQ
AACDK
AAHNG
AAIAL
AAJBT
AAJKR
AANZL
AAOBN
AARHV
AARTL
AASML
AATNV
AATVU
AAUYE
AAWCG
AAYIU
AAYOK
AAYQN
AAYTO
AAYZH
ABAKF
ABBBX
ABBXA
ABDZT
ABECU
ABFTD
ABFTV
ABHLI
ABHQN
ABJCF
ABJNI
ABJOX
ABKCH
ABKTR
ABMNI
ABMQK
ABNWP
ABQBU
ABQSL
ABSXP
ABTEG
ABTHY
ABTKH
ABTMW
ABULA
ABWNU
ABXPI
ACAOD
ACBXY
ACDTI
ACGFS
ACHSB
ACHXU
ACIWK
ACKNC
ACMDZ
ACMLO
ACOKC
ACOMO
ACPIV
ACSNA
ACZOJ
ADHHG
ADHIR
ADIMF
ADINQ
ADKNI
ADKPE
ADRFC
ADTPH
ADURQ
ADYFF
ADZKW
AEBTG
AEFIE
AEFQL
AEGAL
AEGNC
AEJHL
AEJRE
AEKMD
AEMSY
AENEX
AEOHA
AEPYU
AESKC
AETLH
AEVLU
AEXYK
AFBBN
AFEXP
AFGCZ
AFKRA
AFLOW
AFQWF
AFWTZ
AFZKB
AGAYW
AGDGC
AGGDS
AGJBK
AGMZJ
AGQEE
AGQMX
AGRTI
AGWIL
AGWZB
AGYKE
AHAVH
AHBYD
AHKAY
AHSBF
AHYZX
AIAKS
AIGIU
AIIXL
AILAN
AITGF
AJBLW
AJRNO
AJZVZ
ALMA_UNASSIGNED_HOLDINGS
ALWAN
AMKLP
AMXSW
AMYLF
AMYQR
AOCGG
ARAPS
ARMRJ
ASPBG
AVWKF
AXYYD
AYJHY
AZFZN
B-.
BA0
BBWZM
BDATZ
BENPR
BGLVJ
BGNMA
BSONS
CAG
CCPQU
COF
CS3
CSCUP
DDRTE
DL5
DNIVK
DPUIP
DU5
EBLON
EBS
EIOEI
EJD
ESBYG
FEDTE
FERAY
FFXSO
FIGPU
FINBP
FNLPD
FRRFC
FSGXE
FWDCC
GGCAI
GGRSB
GJIRD
GNWQR
GQ6
GQ7
GQ8
GXS
H13
HCIFZ
HF~
HG5
HG6
HMJXF
HQYDN
HRMNR
HVGLF
HZ~
I09
IHE
IJ-
IKXTQ
ITM
IWAJR
IXC
IZIGR
IZQ
I~X
I~Z
J-C
J0Z
JBSCW
JCJTX
JZLTJ
KDC
KOV
KOW
L6V
LAK
LLZTM
M4Y
M7S
MA-
N2Q
NB0
NDZJH
NPVJJ
NQJWS
NU0
O9-
O93
O9G
O9I
O9J
OAM
P19
P62
P9O
PF0
PT4
PT5
PTHSS
Q2X
QOK
QOS
R4E
R89
R9I
RHV
RNI
RNS
ROL
RPX
RSV
RZC
RZE
RZK
S0W
S16
S1Z
S26
S27
S28
S3B
SAP
SCJ
SCLPG
SCO
SDH
SDM
SHX
SISQX
SJYHP
SNE
SNPRN
SNX
SOHCF
SOJ
SPISZ
SRMVM
SSLCW
STPWE
SZN
T13
T16
TSG
TSK
TSV
TUC
U2A
UG4
UOJIU
UTJUX
UZXMN
VC2
VFIZW
W23
W48
WK8
YLTOR
Z45
Z7R
Z7S
Z7V
Z7X
Z7Z
Z81
Z83
Z86
Z88
Z8M
Z8N
Z8P
Z8R
Z8T
Z8U
Z8W
Z92
ZMTXR
~EX
AAPKM
AAYXX
ABBRH
ABDBE
ABFSG
ACSTC
ADHKG
AEZWR
AFDZB
AFHIU
AFOHR
AGQPQ
AHPBZ
AHWEU
AIXLP
ATHPR
AYFIA
CITATION
PHGZM
PHGZT
7SC
8FD
ABRTQ
DWQXO
JQ2
L7M
L~C
L~D
PKEHL
PQEST
PQGLB
PQQKQ
PQUKI
PRINS
ID FETCH-LOGICAL-c359t-f9959897ca52eb5a0cfe0e20873c14a217657122b8c3899719379431a2e775c03
IEDL.DBID U2A
ISSN 1382-3256
IngestDate Fri Jul 25 19:00:11 EDT 2025
Tue Jul 01 03:32:16 EDT 2025
Thu Apr 24 22:52:39 EDT 2025
Fri Feb 21 02:35:46 EST 2025
IsDoiOpenAccess false
IsOpenAccess true
IsPeerReviewed true
IsScholarly true
Issue 6
Keywords Subject Application
Holm Correction
Software Protection
Code Metrics
Cyclomatic Complexity
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c359t-f9959897ca52eb5a0cfe0e20873c14a217657122b8c3899719379431a2e775c03
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
OpenAccessLink http://hdl.handle.net/10278/3746432
PQID 2564698528
PQPubID 326341
PageCount 39
ParticipantIDs proquest_journals_2564698528
crossref_citationtrail_10_1007_s10664_014_9321_0
crossref_primary_10_1007_s10664_014_9321_0
springer_journals_10_1007_s10664_014_9321_0
ProviderPackageCode CITATION
AAYXX
PublicationCentury 2000
PublicationDate 20151200
2015-12-00
20151201
PublicationDateYYYYMMDD 2015-12-01
PublicationDate_xml – month: 12
  year: 2015
  text: 20151200
PublicationDecade 2010
PublicationPlace New York
PublicationPlace_xml – name: New York
– name: Dordrecht
PublicationSubtitle An International Journal
PublicationTitle Empirical software engineering : an international journal
PublicationTitleAbbrev Empir Software Eng
PublicationYear 2015
Publisher Springer US
Springer Nature B.V
Publisher_xml – name: Springer US
– name: Springer Nature B.V
References Wyseur B (2009) White-box cryptography. Ph.D. thesis, Katholieke Universiteit Leuven. http://www.cosic.esat.kuleuven.be/publications/talk-98.pdf
Chidamber SR, Kemerer CF (1994) A metrics suite for object oriented design. IEEE Trans Softw Eng 20:476–493. doi:10.1109/32.295895. http://dl.acm.org/citation.cfm?id=630808.631131
Vasa R, Schneider J.g. (2003) Evolution of cyclomatic complexity in object oriented software. Proceedings of 7th ECOOP workshop on quantitative approaches in ObjectOriented software engineering QAOOSE, vol 03. http://www.it.swin.edu.au/personal/jschneider/Pub/qaoose03.pdf
Collberg C, Thomborson C, Low D (1997) A taxonomy of obfuscating transformations. Tech Rep:148. http://www.cs.auckland.ac.nz/%7Ecollberg/Research/Publications/CollbergThomborsonLow97a/index.html
ZengYLiuFLuoXYangCSoftware watermarking through obfuscated interpretation: Implementation nad analysisJ Multimed201164329339
Ceccato M, Penta M, Falcarin P, Ricca F, Torchiano M, Tonella P A family of experiments to assess the effectiveness and efficiency of source code obfuscation techniques. Empirical software engineeringpp. 1-35 (2013). doi:10.1007/s10664-013-9248-x
Falcarin P, Collberg C, Atallah M, Jakubowski M (2011) Guest editors’ introduction:software protection. IEEE Softw 28:24–27. doi:10.1109/MS.2011.34. doi:10.1109/MS.2011.34
BasiliVBriandLMeloWA validation of object-oriented design metrics as quality indicators. Software engineeringIEEE Trans19962210751761
Sheskin D (2007) Handbook of parametric and nonparametric statistical procedures (4th Ed.). Chapman & All
Collberg CS, Thomborson C (2002) Watermarking, tamper-proofing, and obfuscation: tools for software protection. IEEE Trans Softw Eng 28:735–746. doi:10.1109/TSE.2002.1027797. http://dl.acm.org/citation.cfm?id=636196.636198
Ceccato M, Di Penta M, Nagra J, Falcarin P, Ricca F, Torchiano M, Tonella P Towards experimental evaluation of code obfuscation techniques. In:proceedings of the 4th ACM workshop on quality of protection, QoP ’08, pp. 39–46. ACM, New York, NY, USA (2008). doi:10.1145/1456362.1456371
Anckaert B, Madou M, De Sutter B, De Bus B, De Bosschere K, Preneel B (2007) Program obfuscation: a quantitative approach. In: Proceedings of the 2007 ACM workshop on quality of protection, QoP ’07,pp. 15-20. ACM, New York, NY, USA. doi:10.1145/1314257.1314263
Ceccato M, Capiluppi A, Falcarin P, Boldyreff C (2013) A large study on the effect of code obfuscation on the quality of java code: Detailed analysis of data. Tech. rep., FBK, TR-FBK-SE-2013-3,. http://se.fbk.eu/sites/se.fbk.eu/files/TR-FBK-SE-2013-3.pdf
Kouznetsov P Jad - the fast JAva Decompiler. http://www.kpdus.com/jad.html
Jakubowski MH, Saw CW, Venkatesan R (2009) Iterated transformations and quantitative metrics for software protection. In: SECRYPT
Udupa SK, Debray SK, Madou M Deobfuscation:reverse engineering obfuscated code. In:proceedings of the 12th Working conference on reverse engineering, pp. 45–54. IEEE Computer Society, Washington, DC, USA (2005). http://dl.acm.org/citation.cfm?id=1107841.1108171
Wohlin C, Runeson P, Höst M, Ohlsson M, Regnell B, Wesslén A (2000) Experimentation in software engineering - an introduction, Kluwer Academic Publishers
Cohen FB (1993) Operating system protection through program evolution. Comput Secur 12:565–584. doi:10.1016/0167-4048(93)90054-9. http://dl.acm.org/citation.cfm?id=179007.179012
Collberg C, Myles G, Huntwork A (2003) Sandmark–a tool for software protection research. IEEE Secur Priv 1:40–49. doi:10.1109/MSECP.2003.1219058. http://dl.acm.org/citation.cfm?id=939830.939941
Visaggio CA, Pagin GA, Canfora G (2013) An empirical study of metric-based methods to detect obfuscated code. Int J Secur & Appl 7(2):59
Heffner K, Collberg C (2004) The obfuscation executive. In:Information security. Springer, pp 428–440
Jureczko M, Spinellis D (2010) Using object-oriented design metrics to predict software defects, monographs of system dependability, vol. models and methodology of system dependability, pp. 69–81. Oficyna Wydawnicza Politechniki Wroclawskiej, Wroclaw, Poland
McCabe TJ (1976) A complexity measure. IEEE Trans Softw Eng:308–320
Karnick M, MacBride J, McGinnis S, Tang Y, Ramachandran R (2006) A qualitative analysis of java obfuscation. In: proceedings of 10th IASTED international conference on software engineering and applications, Dallas TX, USA
Goto H, Mambo M, Matsumura K, Shizuya H (2000) An approach to the objective and quantitative evaluation of tamper-resistant software, In: Proceedings of the third international workshop on information security, ISW ’00. Springer-Verlag, London, UK, pp 82–96. http://dl.acm.org/citation.cfm?id=648024.744206
Lv Z, Ri S, Uhvhdufk DE, Dw D, Wkh Y, Ri X, Srsxodu W, Zrun QDS, Vkrzhg ZH (2005) On the relationship between cyclomatic complexity and oo ness, 9th ECOOP workshop on quantitative approaches in ObjectOriented software engineering
Linn C, Debray S (2003) Obfuscation of executable code to improve resistance to static disassembly. In: Proceedings of the 10th ACM conference on computer and communications security, CCS ’03,pp. 290–299. ACM, New York, NY, USA. doi:10.1145/948109.948149
Hosking AL, Nystrom N, Whitlock D, Cutts Q, Diwan A (2001) Partial redundancy elimination for access path expressions. Software:practice and experience, vol 31. doi:10.1002/spe.371
Simon F, Steinbrückner F, Lewerentz C (2001) Metrics based refactoring. In: Proceedings of the Fifth European Conference on software maintenance and Reengineering, CSMR ’01, pp. 30-. IEEE Computer Society, Washington, DC, USA. http://dl.acm.org/citation.cfm?id=794203.795287
SutherlandIKalbGEBlythAMulleyGAn empirical examination of the reverse engineering process for binary filesComput & Secur200625322122810.1016/j.cose.2005.11.002
Ceccato M, Penta MD, Nagra J, Falcarin P, Ricca F, Torchiano M, Tonella P (2009) The effectiveness of source code obfuscation: An experimental assessment. In: ICPC. IEEE Comput Soc:178–187
I Sutherland (9321_CR25) 2006; 25
9321_CR1
9321_CR4
9321_CR3
9321_CR26
9321_CR27
9321_CR28
9321_CR29
V Basili (9321_CR2) 1996; 22
9321_CR20
9321_CR21
9321_CR22
9321_CR23
Y Zeng (9321_CR31) 2011; 6
9321_CR24
9321_CR6
9321_CR14
9321_CR5
9321_CR15
9321_CR8
9321_CR16
9321_CR7
9321_CR17
9321_CR18
9321_CR9
9321_CR19
9321_CR30
9321_CR10
9321_CR11
9321_CR12
9321_CR13
References_xml – reference: Collberg C, Myles G, Huntwork A (2003) Sandmark–a tool for software protection research. IEEE Secur Priv 1:40–49. doi:10.1109/MSECP.2003.1219058. http://dl.acm.org/citation.cfm?id=939830.939941
– reference: Jakubowski MH, Saw CW, Venkatesan R (2009) Iterated transformations and quantitative metrics for software protection. In: SECRYPT
– reference: Ceccato M, Di Penta M, Nagra J, Falcarin P, Ricca F, Torchiano M, Tonella P Towards experimental evaluation of code obfuscation techniques. In:proceedings of the 4th ACM workshop on quality of protection, QoP ’08, pp. 39–46. ACM, New York, NY, USA (2008). doi:10.1145/1456362.1456371
– reference: Goto H, Mambo M, Matsumura K, Shizuya H (2000) An approach to the objective and quantitative evaluation of tamper-resistant software, In: Proceedings of the third international workshop on information security, ISW ’00. Springer-Verlag, London, UK, pp 82–96. http://dl.acm.org/citation.cfm?id=648024.744206
– reference: McCabe TJ (1976) A complexity measure. IEEE Trans Softw Eng:308–320
– reference: Vasa R, Schneider J.g. (2003) Evolution of cyclomatic complexity in object oriented software. Proceedings of 7th ECOOP workshop on quantitative approaches in ObjectOriented software engineering QAOOSE, vol 03. http://www.it.swin.edu.au/personal/jschneider/Pub/qaoose03.pdf
– reference: Ceccato M, Penta M, Falcarin P, Ricca F, Torchiano M, Tonella P A family of experiments to assess the effectiveness and efficiency of source code obfuscation techniques. Empirical software engineeringpp. 1-35 (2013). doi:10.1007/s10664-013-9248-x
– reference: Ceccato M, Penta MD, Nagra J, Falcarin P, Ricca F, Torchiano M, Tonella P (2009) The effectiveness of source code obfuscation: An experimental assessment. In: ICPC. IEEE Comput Soc:178–187
– reference: Wyseur B (2009) White-box cryptography. Ph.D. thesis, Katholieke Universiteit Leuven. http://www.cosic.esat.kuleuven.be/publications/talk-98.pdf
– reference: Collberg CS, Thomborson C (2002) Watermarking, tamper-proofing, and obfuscation: tools for software protection. IEEE Trans Softw Eng 28:735–746. doi:10.1109/TSE.2002.1027797. http://dl.acm.org/citation.cfm?id=636196.636198
– reference: SutherlandIKalbGEBlythAMulleyGAn empirical examination of the reverse engineering process for binary filesComput & Secur200625322122810.1016/j.cose.2005.11.002
– reference: Ceccato M, Capiluppi A, Falcarin P, Boldyreff C (2013) A large study on the effect of code obfuscation on the quality of java code: Detailed analysis of data. Tech. rep., FBK, TR-FBK-SE-2013-3,. http://se.fbk.eu/sites/se.fbk.eu/files/TR-FBK-SE-2013-3.pdf
– reference: Chidamber SR, Kemerer CF (1994) A metrics suite for object oriented design. IEEE Trans Softw Eng 20:476–493. doi:10.1109/32.295895. http://dl.acm.org/citation.cfm?id=630808.631131
– reference: Karnick M, MacBride J, McGinnis S, Tang Y, Ramachandran R (2006) A qualitative analysis of java obfuscation. In: proceedings of 10th IASTED international conference on software engineering and applications, Dallas TX, USA
– reference: BasiliVBriandLMeloWA validation of object-oriented design metrics as quality indicators. Software engineeringIEEE Trans19962210751761
– reference: Sheskin D (2007) Handbook of parametric and nonparametric statistical procedures (4th Ed.). Chapman & All
– reference: Hosking AL, Nystrom N, Whitlock D, Cutts Q, Diwan A (2001) Partial redundancy elimination for access path expressions. Software:practice and experience, vol 31. doi:10.1002/spe.371
– reference: Cohen FB (1993) Operating system protection through program evolution. Comput Secur 12:565–584. doi:10.1016/0167-4048(93)90054-9. http://dl.acm.org/citation.cfm?id=179007.179012
– reference: Collberg C, Thomborson C, Low D (1997) A taxonomy of obfuscating transformations. Tech Rep:148. http://www.cs.auckland.ac.nz/%7Ecollberg/Research/Publications/CollbergThomborsonLow97a/index.html
– reference: Heffner K, Collberg C (2004) The obfuscation executive. In:Information security. Springer, pp 428–440
– reference: Udupa SK, Debray SK, Madou M Deobfuscation:reverse engineering obfuscated code. In:proceedings of the 12th Working conference on reverse engineering, pp. 45–54. IEEE Computer Society, Washington, DC, USA (2005). http://dl.acm.org/citation.cfm?id=1107841.1108171
– reference: Visaggio CA, Pagin GA, Canfora G (2013) An empirical study of metric-based methods to detect obfuscated code. Int J Secur & Appl 7(2):59
– reference: Wohlin C, Runeson P, Höst M, Ohlsson M, Regnell B, Wesslén A (2000) Experimentation in software engineering - an introduction, Kluwer Academic Publishers
– reference: Falcarin P, Collberg C, Atallah M, Jakubowski M (2011) Guest editors’ introduction:software protection. IEEE Softw 28:24–27. doi:10.1109/MS.2011.34. doi:10.1109/MS.2011.34
– reference: Linn C, Debray S (2003) Obfuscation of executable code to improve resistance to static disassembly. In: Proceedings of the 10th ACM conference on computer and communications security, CCS ’03,pp. 290–299. ACM, New York, NY, USA. doi:10.1145/948109.948149
– reference: Anckaert B, Madou M, De Sutter B, De Bus B, De Bosschere K, Preneel B (2007) Program obfuscation: a quantitative approach. In: Proceedings of the 2007 ACM workshop on quality of protection, QoP ’07,pp. 15-20. ACM, New York, NY, USA. doi:10.1145/1314257.1314263
– reference: Simon F, Steinbrückner F, Lewerentz C (2001) Metrics based refactoring. In: Proceedings of the Fifth European Conference on software maintenance and Reengineering, CSMR ’01, pp. 30-. IEEE Computer Society, Washington, DC, USA. http://dl.acm.org/citation.cfm?id=794203.795287
– reference: ZengYLiuFLuoXYangCSoftware watermarking through obfuscated interpretation: Implementation nad analysisJ Multimed201164329339
– reference: Kouznetsov P Jad - the fast JAva Decompiler. http://www.kpdus.com/jad.html
– reference: Lv Z, Ri S, Uhvhdufk DE, Dw D, Wkh Y, Ri X, Srsxodu W, Zrun QDS, Vkrzhg ZH (2005) On the relationship between cyclomatic complexity and oo ness, 9th ECOOP workshop on quantitative approaches in ObjectOriented software engineering
– reference: Jureczko M, Spinellis D (2010) Using object-oriented design metrics to predict software defects, monographs of system dependability, vol. models and methodology of system dependability, pp. 69–81. Oficyna Wydawnicza Politechniki Wroclawskiej, Wroclaw, Poland
– ident: 9321_CR3
– ident: 9321_CR17
– ident: 9321_CR24
  doi: 10.1109/CSMR.2001.914965
– ident: 9321_CR9
  doi: 10.1109/MSECP.2003.1219058
– ident: 9321_CR12
  doi: 10.1109/MS.2011.34
– ident: 9321_CR22
  doi: 10.1109/TSE.1976.233837
– ident: 9321_CR19
– ident: 9321_CR21
– volume: 22
  start-page: 751
  issue: 10
  year: 1996
  ident: 9321_CR2
  publication-title: IEEE Trans
– ident: 9321_CR14
  doi: 10.1007/978-3-540-30144-8_36
– ident: 9321_CR15
  doi: 10.1002/spe.371
– ident: 9321_CR4
  doi: 10.1145/1456362.1456371
– ident: 9321_CR26
– volume: 25
  start-page: 221
  issue: 3
  year: 2006
  ident: 9321_CR25
  publication-title: Comput & Secur
  doi: 10.1016/j.cose.2005.11.002
– ident: 9321_CR6
  doi: 10.1109/ICPC.2009.5090041
– ident: 9321_CR28
– ident: 9321_CR7
  doi: 10.1109/32.295895
– ident: 9321_CR10
– ident: 9321_CR1
  doi: 10.1145/1314257.1314263
– ident: 9321_CR29
  doi: 10.1007/978-1-4615-4625-2
– ident: 9321_CR11
  doi: 10.1109/TSE.2002.1027797
– ident: 9321_CR16
– ident: 9321_CR18
– ident: 9321_CR5
  doi: 10.1007/s10664-013-9248-x
– ident: 9321_CR8
  doi: 10.1016/0167-4048(93)90054-9
– ident: 9321_CR13
  doi: 10.1007/3-540-44456-4_7
– volume: 6
  start-page: 329
  issue: 4
  year: 2011
  ident: 9321_CR31
  publication-title: J Multimed
  doi: 10.4304/jmm.6.4.329-340
– ident: 9321_CR30
– ident: 9321_CR23
– ident: 9321_CR27
– ident: 9321_CR20
  doi: 10.1145/948109.948149
SSID ssj0009745
Score 2.2268012
Snippet Context : Obfuscation is a common technique used to protect software against malicious reverse engineering. Obfuscators manipulate the source code to make it...
Context: Obfuscation is a common technique used to protect software against malicious reverse engineering. Obfuscators manipulate the source code to make it...
SourceID proquest
crossref
springer
SourceType Aggregation Database
Enrichment Source
Index Database
Publisher
StartPage 1486
SubjectTerms Algorithms
Compilers
Computer Science
Interpreters
Modularity
Programming Languages
Reverse engineering
Software
Software engineering
Software Engineering/Programming and Operating Systems
Source code
SummonAdditionalLinks – databaseName: ProQuest Central
  dbid: BENPR
  link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwfV3PS8MwFH7odvHib3E6JQdPSrBNm6Y9yZSNoTBEHOxWkiw5yFin2wT_e_Pa1KLgzn3N4b3kvS_Jy_cBXIWaKysTRlkoNY0jlVGVCkNNoq2OrWWRKrt8R8lwHD9O-MQfuC19W2WdE8tEPS00npHfutKMYoecpXeLd4qqUXi76iU0tqHtUnCatqB93x89vzS0u6KUKUaiPRq5Iep7zerxXJJgB0ZMHYZxe-rflamBm39uSMvCM9iHXY8YSa8K8QFsmfkh7NVqDMQvziN46pEZtnWTkjGWFHPisB2p-jVIYQk-XieFsutldUpXW1TPKr_Q5E1-ytLuGMaD_uvDkHqpBKojnq2oRdqwNBNacmYUl4G2JjAsSEWkw1i6fUfCRciYSjUS6gkH25AZLpTMCMF1EJ1Aa17MzSmQWChjjdWZTlQ8tcbVc6uFMCILpHXwogNB7aZcex5xlLOY5Q0DMno2d57N0bN50IHrn18WFYnGJuNu7fvcr6dl3kS_Azd1PJrP_w52tnmwc9hxAIhX7SldaK0-1ubCgYyVuvQz6Rurzswi
  priority: 102
  providerName: ProQuest
Title A large study on the effect of code obfuscation on the quality of java code
URI https://link.springer.com/article/10.1007/s10664-014-9321-0
https://www.proquest.com/docview/2564698528
Volume 20
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV09T8MwED3RdmHhG1EolQcmkKXEieNkDKgfolKFEJXKFNnGHlCVVLRF4t9jJzEBBEhMGXLxcBfn3sXv3gFc-JIKzSOCic8lDgORYBEzhVUktQy1JoEoWb7TaDwLb-d0Xvdxrxzb3R1Jll_qT81uUWQZEyE2mMPUwC3oUFO6Wx7XjKSN0i4rJxNbbT0cmITujjJ_WuJrMmoQ5rdD0TLXDPdgpwaJKK2iug9bKj-AXTeAAdX78RAmKVpYJjcqRWJRkSMD51BF0UCFRrZfHRVCb1bVjzlnUXVSvlmTZ_7KS7sjmA0HDzdjXE9HwDKgyRprqxQWJ0xySpSg3JNaeYp4MQukH3JTakSU-YSIWFoNPWaQmhWD8zlRjFHpBcfQzotcnQAKmVBaaZnISIRPWpkUriVjiiUe1wZRdMFzbspkLR1uJ1gsskb02Ho2M57NrGczrwuXH48sK92Mv4x7zvdZvYVWmQmdnW5JSdyFKxeP5vavi53-y_oMtg0EohVBpQft9ctGnRuYsRZ9aMXDUR866ehxMjDX68H07r5fvmzv5prLLw
linkProvider Springer Nature
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV3PM8QwFH7DOnDx21gWOXBhMtq0adqDMQZrWZyYcaskkoMxW-xi_FP-Rnlto8MMN-e-Zjovr3lfkve-D2Az1FxZmTDKQqlpHKmMqlQYahJtdWwti1RZ5XuZ9K7jsxt-MwYfvhcGyyr9mlgu1HeFxjPyXZeaUeyQs3T_8YmiahTernoJjSos-ub9zW3ZhnunR25-txjrHl8d9mitKkB1xLMRtciwlWZCS86M4jLQ1gSGBamIdBhLB9ETLkLGVKqRe044hIMkaqFkRgiug8iNOw4TceQyOXamd08akl9RiiIjrR-N3Af7W9SqVS9JsN4jpg4xuR389zzYgNsf97FlmuvOwnSNT8lBFVBzMGYG8zDjtR9IvRQsQP-APGAROSn5aUkxIA5Jkqo6hBSWYKs8KZR9GVZngt6iauJ8R5N7-SpLu0W4_hcXLkFrUAzMMpBYKGON1ZlOVHxnjUMPVgthRBZI68BMGwLvplzXrOUonvGQN3zL6NnceTZHz-ZBG7a_XnmsKDv-Mu543-f13zvMm1hrw46fj-bxr4Ot_D3YBkz2ri7O8_PTy_4qTDnoxavCmA60Rs8vZs3Bm5FaL2OKwO1_B_EngZoFDQ
linkToPdf http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV1LS8QwEB50BfHiW1yfOehFCbZp07QHEV-LurKIKHirSUwOIlt1V8W_5q8z0zYWBb157nQok2nyJZn5PoCNUHNlZcIoC6WmcaQyqlJhqEm01bG1LFJllW8vObmOz274zQh8-F4YLKv0c2I5Ud8VGs_Id9zSjGKHnKU7ti6LuDjq7D0-UVSQwptWL6dRpUjXvL-57dtg9_TIjfUmY53jq8MTWisMUB3xbEgtsm2lmdCSM6O4DLQ1gWFBKiIdxtLB9YSLkDGVauShEw7tIKFaKJkRgusgcn5HYUzgrqgFYwfHvYvLhvJXlBLJSPJHI_f5_k61atxLEqz-iKnDT24__31VbKDuj9vZctHrTMNkjVbJfpVeMzBi-rMw5ZUgSD0xzEF3nzxgSTkp2WpJ0ScOV5KqVoQUlmDjPCmUfRlUJ4TeomrpfEeTe_kqS7t5uP6XIC5Aq1_0zSKQWChjjdWZTlR8Z43DElYLYUQWSOugTRsCH6Zc1xzmKKXxkDfsyxjZ3EU2x8jmQRu2vl55rAg8_jJe8bHP6395kDeZ14ZtPx7N41-dLf3tbB3GXQLn56e97jJMOBzGqyqZFWgNn1_MqsM6Q7VWJxWB2__O409fzwqf
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=A+large+study+on+the+effect+of+code+obfuscation+on+the+quality+of+java+code&rft.jtitle=Empirical+software+engineering+%3A+an+international+journal&rft.au=Ceccato%2C+Mariano&rft.au=Capiluppi%2C+Andrea&rft.au=Falcarin%2C+Paolo&rft.au=Boldyreff%2C+Cornelia&rft.date=2015-12-01&rft.pub=Springer+US&rft.issn=1382-3256&rft.eissn=1573-7616&rft.volume=20&rft.issue=6&rft.spage=1486&rft.epage=1524&rft_id=info:doi/10.1007%2Fs10664-014-9321-0&rft.externalDocID=10_1007_s10664_014_9321_0
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1382-3256&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1382-3256&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1382-3256&client=summon