• Jun 14, 2017 News!Vol.8, No.5 has been indexed by EI (Inspec).   [Click]
  • Nov 09, 2017 News!Vol.9, No.5 has been published with online version. 16 peer reviewed articles from 11 specific areas are published in this issue.   [Click]
  • Jul 19, 2017 News!Vol.9, No.4 has been published with online version. 16 peer reviewed articles from 16 specific areas are published in this issue.   [Click]
General Information
Editor-in-chief
Prof. Wael Badawy
Department of Computing and Information Systems Umm Al Qura University, Canada
I'm happy to take on the position of editor in chief of IJCTE. We encourage authors to submit papers concerning any branch of computer theory and engineering.
IJCTE 2017 Vol.9(1): 28-31 ISSN: 1793-8201
DOI: 10.7763/IJCTE.2017.V9.1106

Comparative Analysis of Code Obfuscation Approaches to Protect Software Products

Hyun-Il Lim
Abstract—As the recent improvement in information technology, the role of software becomes more and more important in computing environments. Software is generally released as a form of binary information, such as instructions and data for executing programs. Although such software is protected by software licenses, it may be analyzed or reverse-engineered to employ in developing other software without permission. Code obfuscation is an approach to making original code harder to analyze or understand by transforming its original code into different form with preserving semantics or execution results. Code obfuscation is helpful to protect against reverse engineering of software. In this paper, we introduce several approaches to obfuscating program code to make software harder to analyze or understand. We introduce measures for evaluating code obfuscation and compare the performance of each code obfuscation methods according to the measures.

Index Terms—Code obfuscation, program transformation, binary code analysis, software protection.

Hyun-Il Lim is with the Dept. of Computer Engineering, Kyungnam University, Republic of Korea (e-mail: hilim@ kyungnam.ac.kr).

[PDF]

Cite:Hyun-Il Lim, "Comparative Analysis of Code Obfuscation Approaches to Protect Software Products," International Journal of Computer Theory and Engineering vol. 9, no. 1, pp. 28-31, 2017.

Copyright © 2008-2015. International Journal of Computer Theory and Engineering. All rights reserved.
E-mail: ijcte@vip.163.com