Mi SciELO
Servicios Personalizados
Articulo
Indicadores
Citado por SciELO
Links relacionados
Similares en SciELO
Compartir
Ingeniería Industrial
versión On-line ISSN 1815-5936
Resumen
RODRIGUEZ VELIZ, Miguel; HERNANDEZ GONZALEZ, Anaisa; LIMA, Roberto Sepúlveda y MUSA, Yulier Núñez. Validation of a protection model based on code obfuscation. Ing. Ind. [online]. 2024, vol.45, n.2, pp. 91-108. Epub 22-Feb-2025. ISSN 1815-5936.
Code obfuscation is one of the techniques used for privacy against reverse engineering attacks on the source code. This research presents a model to obfuscate the call graph as a source code protection technique and its validation through the performance of white-box and black-box tests and the evaluation of the obscurity performance and the cost of the model in static reverse engineering attacks. Based on the measures that are usually used to quantify the quality of obfuscation techniques and the most common obfuscation quality attributes, the use of the degree of diversification and obfuscation achieved by the call graph of the obfuscated program ϑ(P), with respect to the original program P in the model proposed by this work is based.
Palabras clave : software protection model; quality of obfuscation techniques; diversification power; obfuscation power.