Pratik Kanani, Kriti Srivastava, Janan Gandhi, Disha H. Parekh, Meeth Gala
{"title":"混淆:代码迷宫","authors":"Pratik Kanani, Kriti Srivastava, Janan Gandhi, Disha H. Parekh, Meeth Gala","doi":"10.1109/CSCITA.2017.8066544","DOIUrl":null,"url":null,"abstract":"Software Reverse Engineering scenario would involve software that has been worked upon for years and carries several modules of a business in its lines of code. Unfortunately the source code of the application has been lost, what remains is “native” or “binary” code. Traditional obfuscators work on binary code but they are tedious and do not provide us with a specific obfuscation depending upon the code. A way is provided in which the code can be obfuscated depending upon lines of code and variables. The application of this data confers to the additional information developers need to better understand, maintain and develop software in large team settings. The solution is provided in order to encourage software piracy and impede malware analysis. This paper introduces MAZE-OF-CODE, reveals the results of our evaluation and proposes directions for future research in this area. MAZE-OF-CODE will increase size of code and compilation time is also satisfactory and makes software reverse engineering difficult.","PeriodicalId":299147,"journal":{"name":"2017 2nd International Conference on Communication Systems, Computing and IT Applications (CSCITA)","volume":"86 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"8","resultStr":"{\"title\":\"Obfuscation: Maze of code\",\"authors\":\"Pratik Kanani, Kriti Srivastava, Janan Gandhi, Disha H. Parekh, Meeth Gala\",\"doi\":\"10.1109/CSCITA.2017.8066544\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Software Reverse Engineering scenario would involve software that has been worked upon for years and carries several modules of a business in its lines of code. Unfortunately the source code of the application has been lost, what remains is “native” or “binary” code. Traditional obfuscators work on binary code but they are tedious and do not provide us with a specific obfuscation depending upon the code. A way is provided in which the code can be obfuscated depending upon lines of code and variables. The application of this data confers to the additional information developers need to better understand, maintain and develop software in large team settings. The solution is provided in order to encourage software piracy and impede malware analysis. This paper introduces MAZE-OF-CODE, reveals the results of our evaluation and proposes directions for future research in this area. MAZE-OF-CODE will increase size of code and compilation time is also satisfactory and makes software reverse engineering difficult.\",\"PeriodicalId\":299147,\"journal\":{\"name\":\"2017 2nd International Conference on Communication Systems, Computing and IT Applications (CSCITA)\",\"volume\":\"86 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2017-04-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"8\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2017 2nd International Conference on Communication Systems, Computing and IT Applications (CSCITA)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/CSCITA.2017.8066544\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2017 2nd International Conference on Communication Systems, Computing and IT Applications (CSCITA)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CSCITA.2017.8066544","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Software Reverse Engineering scenario would involve software that has been worked upon for years and carries several modules of a business in its lines of code. Unfortunately the source code of the application has been lost, what remains is “native” or “binary” code. Traditional obfuscators work on binary code but they are tedious and do not provide us with a specific obfuscation depending upon the code. A way is provided in which the code can be obfuscated depending upon lines of code and variables. The application of this data confers to the additional information developers need to better understand, maintain and develop software in large team settings. The solution is provided in order to encourage software piracy and impede malware analysis. This paper introduces MAZE-OF-CODE, reveals the results of our evaluation and proposes directions for future research in this area. MAZE-OF-CODE will increase size of code and compilation time is also satisfactory and makes software reverse engineering difficult.