Skip to main content

Creative Manual Code Obfuscation as a Countermeasure Against Software Reverse Engineering

  • Conference paper
  • First Online:
Advances in Human Factors in Cybersecurity (AHFE 2020)

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 1219))

Included in the following conference series:

  • 1624 Accesses

Abstract

Due to the relevance of IT security to industry, politics, and the public alike, research on IT-security-related issues is abundant. However, a lack of interdisciplinarity in this domain has led to a vast amount of detailed information on technical aspects of security one the one hand, and little to no insight into the psychological aspects of attacking, defending, or securely using technological systems on the other. This research effort aims to contribute to filling this gap by determining cognitive predictors of software reverse engineering as well as code obfuscation success and by describing and analyzing approaches and strategies IT specialists use when attacking or defending Java programs. Moreover, the relevance of adversarial reasoning in this domain is assessed. In an experimental design, participant pairs either receive an instruction into game theoretical concepts of adversarial reasoning or not, to then obfuscate Java code or reverse engineer clear and obfuscated code.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Fyrbiak, M., Strauß, S., Kison, C., Wallat, S., Elson, M., Rummel, N., Paar, C.: Hardware reverse engineering: overview and open challenges. In: 2017 IEEE 2nd International Verification and Security Workshop (IVSW), pp. 88–94. IEEE (July 2017)

    Google Scholar 

  2. Dörner, D., Funke, J.: Complex problem solving: what it is and what it is not. Front. Psychol. 8, 1153 (2017)

    Article  Google Scholar 

  3. Hendrix, D., Cross, J.H., Maghsoodloo, S.: The effectiveness of control structure diagrams in source code comprehension activities. IEEE Trans. Softw. Eng. 28(5), 463–477 (2002)

    Article  Google Scholar 

  4. Schrittwieser, S., Katzenbeisser, S., Kieseberg, P., Huber, M., Leithner, M., Mulazzani, M., Weippl, E.: Covert computation: hiding code in code for obfuscation purposes. In: Proceedings of the 8th ACM SIGSAC Symposium on Information, Computer and Communications Security, pp. 529–534. ACM (May 2013)

    Google Scholar 

  5. Park, J., Kim, H., Jeong, Y., Cho, S.J., Han, S., Park, M.: Effects of code obfuscation on android app similarity analysis. J. Wirel. Mob. Netw. Ubiquitous Comput. Dependable Appl. 6(4), 86–98 (2015)

    Google Scholar 

  6. Ceccato, M., Di Penta, M., Falcarin, P., Ricca, F., Torchiano, M., Tonella, P.: A family of experiments to assess the effectiveness and efficiency of source code obfuscation techniques. Empir. Softw. Eng. 19(4), 1040–1074 (2014)

    Google Scholar 

  7. Hänsch, N., Schankin, A., Protsenko, M., Freiling, F., Benenson, Z.: Programming experience might not help in comprehending obfuscated source code efficiently. In: Fourteenth Symposium on Usable Privacy and Security (SOUPS 2018), pp. 341–356 (2018)

    Google Scholar 

  8. Hamman, S.T., Hopkinson, K.M., Markham, R.L., Chaplik, A.M., Metzler, G.E.: Teaching game theory to improve adversarial thinking in cybersecurity students. IEEE Trans. Educ. 60(3), 205–211 (2017)

    Article  Google Scholar 

  9. Dörner, D., Kreuzig, H.W., Reither, F., Stäudel, T.: Lohhausen: Vom Umgang mit Unbestimmtheit und Komplexität. [Lohhausen: dealing with indefiniteness and complexity] (1983)

    Google Scholar 

  10. Summers, T.C.: How hackers think: a mixed method study of mental models and cognitive patterns of high-tech wizards (Doctoral dissertation, Case Western Reserve University) (2015)

    Google Scholar 

  11. Stahl, D., Wilson, P.: On players’ models of other players: theory and experimental evidence. Games Econ. Behav. 10, 218–254 (1995)

    Article  MathSciNet  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Salsabil Hamadache .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Hamadache, S., Elson, M. (2020). Creative Manual Code Obfuscation as a Countermeasure Against Software Reverse Engineering. In: Corradini, I., Nardelli, E., Ahram, T. (eds) Advances in Human Factors in Cybersecurity. AHFE 2020. Advances in Intelligent Systems and Computing, vol 1219. Springer, Cham. https://doi.org/10.1007/978-3-030-52581-1_1

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-52581-1_1

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-52580-4

  • Online ISBN: 978-3-030-52581-1

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics