A Comprehensive Analysis of Software Obfuscation Techniques

In today's environment, a huge and increasing range of unauthorised practises allows hackers to get unauthorised access to devices and private information by inserting harmful code. The purpose of this research is to assess the efficiency of obfuscation strategies in safeguarding software again...

Full description

Saved in:
Bibliographic Details
Published inInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology pp. 314 - 320
Main Authors Priyanka Kadam, Hrishikesh Devgude, Srivaramangai R
Format Journal Article
LanguageEnglish
Published 30.05.2023
Online AccessGet full text

Cover

Loading…
More Information
Summary:In today's environment, a huge and increasing range of unauthorised practises allows hackers to get unauthorised access to devices and private information by inserting harmful code. The purpose of this research is to assess the efficiency of obfuscation strategies in safeguarding software against reverse engineering and tampering. This study tries to evaluate various obfuscation approaches, such as code obfuscation, control flow obfuscation, and data obfuscation. The findings of this study will contribute to the establishment of best practises for software developers to protect their code from unauthorised access and alteration by providing useful insights into the efficiency of obfuscation approaches in software protection.
ISSN:2456-3307
2456-3307
DOI:10.32628/CSEIT2390376