Abstract
Due to the relevance of IT security to industry, politics, and the public alike, research on IT-security-related issues is abundant. However, a lack of interdisciplinarity in this domain has led to a vast amount of detailed information on technical aspects of security one the one hand, and little to no insight into the psychological aspects of attacking, defending, or securely using technological systems on the other. This research effort aims to contribute to filling this gap by determining cognitive predictors of software reverse engineering as well as code obfuscation success and by describing and analyzing approaches and strategies IT specialists use when attacking or defending Java programs. Moreover, the relevance of adversarial reasoning in this domain is assessed. In an experimental design, participant pairs either receive an instruction into game theoretical concepts of adversarial reasoning or not, to then obfuscate Java code or reverse engineer clear and obfuscated code.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Fyrbiak, M., Strauß, S., Kison, C., Wallat, S., Elson, M., Rummel, N., Paar, C.: Hardware reverse engineering: overview and open challenges. In: 2017 IEEE 2nd International Verification and Security Workshop (IVSW), pp. 88–94. IEEE (July 2017)
Dörner, D., Funke, J.: Complex problem solving: what it is and what it is not. Front. Psychol. 8, 1153 (2017)
Hendrix, D., Cross, J.H., Maghsoodloo, S.: The effectiveness of control structure diagrams in source code comprehension activities. IEEE Trans. Softw. Eng. 28(5), 463–477 (2002)
Schrittwieser, S., Katzenbeisser, S., Kieseberg, P., Huber, M., Leithner, M., Mulazzani, M., Weippl, E.: Covert computation: hiding code in code for obfuscation purposes. In: Proceedings of the 8th ACM SIGSAC Symposium on Information, Computer and Communications Security, pp. 529–534. ACM (May 2013)
Park, J., Kim, H., Jeong, Y., Cho, S.J., Han, S., Park, M.: Effects of code obfuscation on android app similarity analysis. J. Wirel. Mob. Netw. Ubiquitous Comput. Dependable Appl. 6(4), 86–98 (2015)
Ceccato, M., Di Penta, M., Falcarin, P., Ricca, F., Torchiano, M., Tonella, P.: A family of experiments to assess the effectiveness and efficiency of source code obfuscation techniques. Empir. Softw. Eng. 19(4), 1040–1074 (2014)
Hänsch, N., Schankin, A., Protsenko, M., Freiling, F., Benenson, Z.: Programming experience might not help in comprehending obfuscated source code efficiently. In: Fourteenth Symposium on Usable Privacy and Security (SOUPS 2018), pp. 341–356 (2018)
Hamman, S.T., Hopkinson, K.M., Markham, R.L., Chaplik, A.M., Metzler, G.E.: Teaching game theory to improve adversarial thinking in cybersecurity students. IEEE Trans. Educ. 60(3), 205–211 (2017)
Dörner, D., Kreuzig, H.W., Reither, F., Stäudel, T.: Lohhausen: Vom Umgang mit Unbestimmtheit und Komplexität. [Lohhausen: dealing with indefiniteness and complexity] (1983)
Summers, T.C.: How hackers think: a mixed method study of mental models and cognitive patterns of high-tech wizards (Doctoral dissertation, Case Western Reserve University) (2015)
Stahl, D., Wilson, P.: On players’ models of other players: theory and experimental evidence. Games Econ. Behav. 10, 218–254 (1995)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Hamadache, S., Elson, M. (2020). Creative Manual Code Obfuscation as a Countermeasure Against Software Reverse Engineering. In: Corradini, I., Nardelli, E., Ahram, T. (eds) Advances in Human Factors in Cybersecurity. AHFE 2020. Advances in Intelligent Systems and Computing, vol 1219. Springer, Cham. https://doi.org/10.1007/978-3-030-52581-1_1
Download citation
DOI: https://doi.org/10.1007/978-3-030-52581-1_1
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-52580-4
Online ISBN: 978-3-030-52581-1
eBook Packages: EngineeringEngineering (R0)