Reference Hub3
A Novel Software Protection Approach for Code Obfuscation to Enhance Software Security

A Novel Software Protection Approach for Code Obfuscation to Enhance Software Security

Pratiksha Gautam, Hemraj Saini
Copyright: © 2017 |Volume: 8 |Issue: 1 |Pages: 14
ISSN: 1937-9412|EISSN: 1937-9404|EISBN13: 9781522511953|DOI: 10.4018/IJMCMC.2017010103
Cite Article Cite Article

MLA

Gautam, Pratiksha, and Hemraj Saini. "A Novel Software Protection Approach for Code Obfuscation to Enhance Software Security." IJMCMC vol.8, no.1 2017: pp.34-47. http://doi.org/10.4018/IJMCMC.2017010103

APA

Gautam, P. & Saini, H. (2017). A Novel Software Protection Approach for Code Obfuscation to Enhance Software Security. International Journal of Mobile Computing and Multimedia Communications (IJMCMC), 8(1), 34-47. http://doi.org/10.4018/IJMCMC.2017010103

Chicago

Gautam, Pratiksha, and Hemraj Saini. "A Novel Software Protection Approach for Code Obfuscation to Enhance Software Security," International Journal of Mobile Computing and Multimedia Communications (IJMCMC) 8, no.1: 34-47. http://doi.org/10.4018/IJMCMC.2017010103

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

Over the past few decades ago, software developers analyzed robustly several forms of software protection against illegal copying or piracy. With the expansion in digital technology, the risk of illegal copying of software also amplifies. The increasing piracy rate has posed a serious threat to software developers leading to the development of various software protection techniques. However, various techniques have been proposed for copyright protection such as software watermarking, obfuscation, tamper-proofing and diversity. The code transformation (obfuscation) is a method of transforming a program into a form which is more complicated for an adversary to understand or change the original code from an illegitimate process of reverse engineering. None of the current code obfuscation approaches provide resistance from reverse engineering attacks. The reverse engineering threat occurs due to the unconfined software code to the user. Malicious reverse engineering of software codes can be harder by exertion of code transformation on software programs. To address this, we acquaint a peculiar code transformation approach for software protection. The proposed approach is used semantically equivalent to code clone within the source code to protect logical part of program text. We have successfully implement our approach using open source java project Gantt project system and open source java obfuscator's tools. In this paper, we present our approach and demonstrate it with an illustration. The intent of this method is to prevent static analysis attack and make dynamic attack compact for an adversary. This makes it worthwhile against reverse engineering attacks.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.