Call graph obfuscation and diversification: An approach

3Citations
Citations of this article
10Readers
Mendeley users who have this article in their library.

Abstract

Monetary loss due to software piracy nowadays reaches millions. In 2017, the commercial value for this concept rose to $46.3 billion. A way to mitigate this problem from the technological point of view is the use of software protection techniques, especially the obfuscation and diversification of code, highlighting the control obfuscation. There are many proposals connected with obfuscating control flow graph. However, there are few reported works that perform obfuscation of the call graph. In this study, the authors propose a novel mechanism for the static obfuscation and diversification of the call graph of a software. The mechanism is based on the routing of functions calls in order to modify the software call graph. A prototype of the proposed mechanism was developed by extending the functionalities of a compiler. The generated software differed structurally by 25% on average, compared to the original software. There was an increase in the level of obfuscation from 2 to 30% in the tests performed, with only a 3% overhead of the execution time in all cases. The proposal allows to restructure the whole call graph efficiently, increasing the level of protection without affecting significantly the software performance.

References Powered by Scopus

SPEC CPU2000: Measuring CPU performance in the new millennium

629Citations
N/AReaders
Get full text

Watermarking, tamper-proofing, and obfuscation - Tools for software protection

536Citations
N/AReaders
Get full text

On obfuscating point functions

197Citations
N/AReaders
Get full text

Cited by Powered by Scopus

COOPS: A Code Obfuscation Method Based on Obscuring Program Semantics

4Citations
N/AReaders
Get full text

Metrics for code obfuscation based on symbolic execution and N-scope complexity

1Citations
N/AReaders
Get full text

An Efficient Control-flow based Obfuscator for Micropython Bytecode

1Citations
N/AReaders
Get full text

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Cite

CITATION STYLE

APA

Rodríguez-Veliz, M., Nuñez-Musa, Y., & Sepúlveda-Lima, R. (2020). Call graph obfuscation and diversification: An approach. IET Information Security, 14(2), 241–252. https://doi.org/10.1049/iet-ifs.2019.0216

Readers' Seniority

Tooltip

PhD / Post grad / Masters / Doc 4

80%

Professor / Associate Prof. 1

20%

Readers' Discipline

Tooltip

Computer Science 3

50%

Engineering 2

33%

Psychology 1

17%

Article Metrics

Tooltip
Social Media
Shares, Likes & Comments: 9

Save time finding and organizing research with Mendeley

Sign up for free