A software engineering methodology for developing secure obfuscated software

3Citations
Citations of this article
7Readers
Mendeley users who have this article in their library.
Get full text

Abstract

We propose a methodology to conciliate two apparently contradictory processes in the development of secure obfuscated software and good software engineered software. Our methodology consists first in the system designers defining the type of security level required for the software. There are four types of attackers: casual attackers, hackers, institution attack, and government attack. Depending on the level of threat, the methodology we propose uses five or six teams to accomplish this task. One Software Engineer Team and one or two Software Obfuscation Teams, and Compiler Team. These four teams will develop and compile the secure obfuscated software. A Code Breakers Team will test the results of the previous teams to see if the software is not broken at the required security level, and an Intrusion Analysis Team will analyze the results of the Code Breakers Team and propose solutions to the development teams to prevent the detected intrusions. We present also an analytical model to prove that our methodology is no only easier to use, but generates an economical way of producing secure obfuscated software.

Cite

CITATION STYLE

APA

Gonzalez, C., & Liñan, E. (2020). A software engineering methodology for developing secure obfuscated software. In Lecture Notes in Networks and Systems (Vol. 70, pp. 1069–1078). Springer. https://doi.org/10.1007/978-3-030-12385-7_72

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free