A Comprehensive Analysis of Software Obfuscation Techniques
In today's environment, a huge and increasing range of unauthorised practises allows hackers to get unauthorised access to devices and private information by inserting harmful code. The purpose of this research is to assess the efficiency of obfuscation strategies in safeguarding software again...
Saved in:
Published in | International Journal of Scientific Research in Computer Science, Engineering and Information Technology pp. 314 - 320 |
---|---|
Main Authors | , , |
Format | Journal Article |
Language | English |
Published |
30.05.2023
|
Online Access | Get full text |
Cover
Loading…
Summary: | In today's environment, a huge and increasing range of unauthorised practises allows hackers to get unauthorised access to devices and private information by inserting harmful code. The purpose of this research is to assess the efficiency of obfuscation strategies in safeguarding software against reverse engineering and tampering. This study tries to evaluate various obfuscation approaches, such as code obfuscation, control flow obfuscation, and data obfuscation. The findings of this study will contribute to the establishment of best practises for software developers to protect their code from unauthorised access and alteration by providing useful insights into the efficiency of obfuscation approaches in software protection. |
---|---|
ISSN: | 2456-3307 2456-3307 |
DOI: | 10.32628/CSEIT2390376 |