SciELO - Scientific Electronic Library Online

 
vol.45 número2Optimización y trazabilidad de rutas en el proceso de distribución de la cadena logística de Correos de CubaInvestigación de Operaciones versus ERP Odoo en la planificación de la producción índice de autoresíndice de materiabúsqueda de artículos
Home Pagelista alfabética de revistas  

Servicios Personalizados

Articulo

Indicadores

  • No hay articulos citadosCitado por SciELO

Links relacionados

  • No hay articulos similaresSimilares en SciELO

Compartir


Ingeniería Industrial

versión On-line ISSN 1815-5936

Resumen

RODRIGUEZ VELIZ, Miguel; HERNANDEZ GONZALEZ, Anaisa; LIMA, Roberto Sepúlveda  y  MUSA, Yulier Núñez. Validation of a protection model based on code obfuscation. Ing. Ind. [online]. 2024, vol.45, n.2, pp. 91-108.  Epub 22-Feb-2025. ISSN 1815-5936.

Code obfuscation is one of the techniques used for privacy against reverse engineering attacks on the source code. This research presents a model to obfuscate the call graph as a source code protection technique and its validation through the performance of white-box and black-box tests and the evaluation of the obscurity performance and the cost of the model in static reverse engineering attacks. Based on the measures that are usually used to quantify the quality of obfuscation techniques and the most common obfuscation quality attributes, the use of the degree of diversification and obfuscation achieved by the call graph of the obfuscated program ϑ(P), with respect to the original program P in the model proposed by this work is based.

Palabras clave : software protection model; quality of obfuscation techniques; diversification power; obfuscation power.

        · resumen en Español     · texto en Español     · Español ( pdf )