• Oct 26, 2018 News!Vol.10, No.5 has been published with online version.   [Click]
  • Aug 06, 2018 News!Vol.9, No.1-Vol.9, No.4 have been indexed by EI (Inspec).   [Click]
  • Sep 03, 2018 News!Vol.10, No.4 has been published with online version.   [Click]
General Information
Editor-in-chief
Prof. Wael Badawy
Department of Computing and Information Systems Umm Al Qura University, Canada
I'm happy to take on the position of editor in chief of IJCTE. We encourage authors to submit papers concerning any branch of computer theory and engineering.
IJCTE 2017 Vol.9(1): 28-31 ISSN: 1793-8201
DOI: 10.7763/IJCTE.2017.V9.1106

Comparative Analysis of Code Obfuscation Approaches to Protect Software Products

Hyun-Il Lim
Abstract—As the recent improvement in information technology, the role of software becomes more and more important in computing environments. Software is generally released as a form of binary information, such as instructions and data for executing programs. Although such software is protected by software licenses, it may be analyzed or reverse-engineered to employ in developing other software without permission. Code obfuscation is an approach to making original code harder to analyze or understand by transforming its original code into different form with preserving semantics or execution results. Code obfuscation is helpful to protect against reverse engineering of software. In this paper, we introduce several approaches to obfuscating program code to make software harder to analyze or understand. We introduce measures for evaluating code obfuscation and compare the performance of each code obfuscation methods according to the measures.

Index Terms—Code obfuscation, program transformation, binary code analysis, software protection.

Hyun-Il Lim is with the Dept. of Computer Engineering, Kyungnam University, Republic of Korea (e-mail: hilim@ kyungnam.ac.kr).

[PDF]

Cite:Hyun-Il Lim, "Comparative Analysis of Code Obfuscation Approaches to Protect Software Products," International Journal of Computer Theory and Engineering vol. 9, no. 1, pp. 28-31, 2017.

Copyright © 2008-2018. International Journal of Computer Theory and Engineering. All rights reserved.
E-mail: ijcte@iacsitp.com