<?xml version="1.0" encoding="ISO-8859-1"?><article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance">
<front>
<journal-meta>
<journal-id>1815-5936</journal-id>
<journal-title><![CDATA[Ingeniería Industrial]]></journal-title>
<abbrev-journal-title><![CDATA[Ing. Ind.]]></abbrev-journal-title>
<issn>1815-5936</issn>
<publisher>
<publisher-name><![CDATA[Facultad de Ingeniería Industrial, Instituto Superior Politécnico José Antonio Echeverría, Cujae.]]></publisher-name>
</publisher>
</journal-meta>
<article-meta>
<article-id>S1815-59362024000200091</article-id>
<title-group>
<article-title xml:lang="es"><![CDATA[Validación de un modelo de protección basado en la ofuscación del código]]></article-title>
<article-title xml:lang="en"><![CDATA[Validation of a protection model based on code obfuscation]]></article-title>
</title-group>
<contrib-group>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Rodríguez Véliz]]></surname>
<given-names><![CDATA[Miguel]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Hernández González]]></surname>
<given-names><![CDATA[Anaisa]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Lima]]></surname>
<given-names><![CDATA[Roberto Sepúlveda]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Musa]]></surname>
<given-names><![CDATA[Yulier Núñez]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
</contrib-group>
<aff id="Af1">
<institution><![CDATA[,Universidad Técnica de Manabí Facultad de Ciencias Informáticas ]]></institution>
<addr-line><![CDATA[Portoviejo ]]></addr-line>
<country>Ecuador</country>
</aff>
<aff id="Af2">
<institution><![CDATA[,Universidad Tecnológica de la Habana &#8220;José Antonio Echeverría&#8221; Facultad de Ingeniería Informática ]]></institution>
<addr-line><![CDATA[La Habana ]]></addr-line>
<country>Cuba</country>
</aff>
<aff id="Af3">
<institution><![CDATA[,Investigador independiente  ]]></institution>
<addr-line><![CDATA[ ]]></addr-line>
<country>España</country>
</aff>
<pub-date pub-type="pub">
<day>00</day>
<month>08</month>
<year>2024</year>
</pub-date>
<pub-date pub-type="epub">
<day>00</day>
<month>08</month>
<year>2024</year>
</pub-date>
<volume>45</volume>
<numero>2</numero>
<fpage>91</fpage>
<lpage>108</lpage>
<copyright-statement/>
<copyright-year/>
<self-uri xlink:href="http://scielo.sld.cu/scielo.php?script=sci_arttext&amp;pid=S1815-59362024000200091&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://scielo.sld.cu/scielo.php?script=sci_abstract&amp;pid=S1815-59362024000200091&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://scielo.sld.cu/scielo.php?script=sci_pdf&amp;pid=S1815-59362024000200091&amp;lng=en&amp;nrm=iso"></self-uri><abstract abstract-type="short" xml:lang="es"><p><![CDATA[RESUMEN La ofuscación del código es una de las técnicas que se utiliza para la privacidad ante ataques de ingeniería inversa al código fuente. Esta investigación presenta un modelo para ofuscar el grafo de llamada como técnica de protección del código fuente y su validación a través de la realización de pruebas de caja blanca, caja negra y la evaluación el desempeño de la oscuridad y el costo del modelo en ataques estáticos de ingeniería inversa. A partir de las medidas que usualmente se emplean para cuantificar la calidad de las técnicas de ofuscación y los atributos de calidad de la ofuscación más comunes, se fundamenta el empleo del grado de diversificación y ofuscación alcanzado por el grafo de llamadas del programa ofuscado &#977;(P), respecto al programa original P en el modelo que propone este trabajo.]]></p></abstract>
<abstract abstract-type="short" xml:lang="en"><p><![CDATA[ABSTRACT Code obfuscation is one of the techniques used for privacy against reverse engineering attacks on the source code. This research presents a model to obfuscate the call graph as a source code protection technique and its validation through the performance of white-box and black-box tests and the evaluation of the obscurity performance and the cost of the model in static reverse engineering attacks. Based on the measures that are usually used to quantify the quality of obfuscation techniques and the most common obfuscation quality attributes, the use of the degree of diversification and obfuscation achieved by the call graph of the obfuscated program &#977;(P), with respect to the original program P in the model proposed by this work is based.]]></p></abstract>
<kwd-group>
<kwd lng="es"><![CDATA[modelo de protección de software]]></kwd>
<kwd lng="es"><![CDATA[calidad de las técnicas de ofuscación]]></kwd>
<kwd lng="es"><![CDATA[potencia de diversificación]]></kwd>
<kwd lng="es"><![CDATA[potencia de ofuscación]]></kwd>
<kwd lng="en"><![CDATA[software protection model]]></kwd>
<kwd lng="en"><![CDATA[quality of obfuscation techniques]]></kwd>
<kwd lng="en"><![CDATA[diversification power]]></kwd>
<kwd lng="en"><![CDATA[obfuscation power]]></kwd>
</kwd-group>
</article-meta>
</front><back>
<ref-list>
<ref id="B1">
<label>1.</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Díaz Pando]]></surname>
<given-names><![CDATA[H]]></given-names>
</name>
<name>
<surname><![CDATA[Rodríguez Veliz]]></surname>
<given-names><![CDATA[M]]></given-names>
</name>
<name>
<surname><![CDATA[Núñez Musa]]></surname>
<given-names><![CDATA[Y]]></given-names>
</name>
<name>
<surname><![CDATA[Sepúlveda Lima]]></surname>
<given-names><![CDATA[R]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[La seguridad de la información: un oscuro espacio multidimensional. Informática y Sistemas]]></article-title>
<source><![CDATA[Revista de Tecnologías de la Información y las Comunicaciones]]></source>
<year>2018</year>
<volume>2</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>75-84</page-range></nlm-citation>
</ref>
<ref id="B2">
<label>2.</label><nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Gatica]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Beron]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Riesco]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
<name>
<surname><![CDATA[Pereira]]></surname>
<given-names><![CDATA[M. J.]]></given-names>
</name>
<name>
<surname><![CDATA[Henriques]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
<name>
<surname><![CDATA[Novais]]></surname>
<given-names><![CDATA[P]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Protección de activos de software]]></article-title>
<source><![CDATA[XXV Workkshop de Investigación en Ciencias de la Computación]]></source>
<year>2023</year>
<page-range>699-703</page-range><publisher-loc><![CDATA[Junín ]]></publisher-loc>
</nlm-citation>
</ref>
<ref id="B3">
<label>3.</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Marreros J.]]></surname>
<given-names><![CDATA[Acosta D.]]></given-names>
</name>
<name>
<surname><![CDATA[Mendoza]]></surname>
<given-names><![CDATA[A]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Mecanismos de seguridad de la información en una organización: una revisión sistemática]]></article-title>
<source><![CDATA[Revista Científica Ciencias Ingenieriles]]></source>
<year>2024</year>
<volume>4</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>79-90</page-range></nlm-citation>
</ref>
<ref id="B4">
<label>4.</label><nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Montejano Masa]]></surname>
<given-names><![CDATA[J. P]]></given-names>
</name>
<name>
<surname><![CDATA[Berón]]></surname>
<given-names><![CDATA[M]]></given-names>
</name>
<name>
<surname><![CDATA[Montejano]]></surname>
<given-names><![CDATA[G. A]]></given-names>
</name>
<name>
<surname><![CDATA[Riesco]]></surname>
<given-names><![CDATA[D. E]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Métodos, técnicas y herramientas para la protección de sistemas de software]]></article-title>
<source><![CDATA[XXV Workkshop de Investigación en Ciencias de la Computación]]></source>
<year>2023</year>
<page-range>719-23</page-range><publisher-loc><![CDATA[Junín ]]></publisher-loc>
</nlm-citation>
</ref>
<ref id="B5">
<label>5.</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Rodríguez Véliz]]></surname>
<given-names><![CDATA[J. M]]></given-names>
</name>
<name>
<surname><![CDATA[Núñez Musa]]></surname>
<given-names><![CDATA[Y]]></given-names>
</name>
<name>
<surname><![CDATA[Sepúlveda Lima]]></surname>
<given-names><![CDATA[R]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Study of Code Obfuscation Techniques for the Security of Software Components]]></article-title>
<source><![CDATA[International Journal of Intelligent Systems and Applications in Engineering]]></source>
<year>2023</year>
<volume>11</volume>
<page-range>1-10</page-range></nlm-citation>
</ref>
<ref id="B6">
<label>6.</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Xu]]></surname>
<given-names><![CDATA[H.]]></given-names>
</name>
<name>
<surname><![CDATA[Zhou]]></surname>
<given-names><![CDATA[Y.]]></given-names>
</name>
<name>
<surname><![CDATA[Ming]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Lyu]]></surname>
<given-names><![CDATA[M]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Layered obfuscation: a taxonomy of software obfuscation tecniques for layered security]]></article-title>
<source><![CDATA[Cibersegurity]]></source>
<year>2020</year>
<volume>3</volume>
<page-range>1-18</page-range></nlm-citation>
</ref>
<ref id="B7">
<label>7.</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Ebad]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Daren]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Abawagy]]></surname>
<given-names><![CDATA[J]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Measuring software obfuscation quality -a systematic literature review]]></article-title>
<source><![CDATA[IEEE Access]]></source>
<year>2021</year>
<volume>9</volume>
</nlm-citation>
</ref>
<ref id="B8">
<label>8.</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Hosseinzadeh]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Rauti]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Laurén]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Mäkelä]]></surname>
<given-names><![CDATA[J. M.]]></given-names>
</name>
<name>
<surname><![CDATA[Holvitie]]></surname>
<given-names><![CDATA[J. H.]]></given-names>
</name>
<name>
<surname><![CDATA[Leppänen]]></surname>
<given-names><![CDATA[V]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Diversification and obfuscation techniques for software security: A systematic literature review]]></article-title>
<source><![CDATA[Information and Software Technology]]></source>
<year>2018</year>
<volume>104</volume>
<page-range>72-93</page-range></nlm-citation>
</ref>
<ref id="B9">
<label>9.</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Collberg]]></surname>
<given-names><![CDATA[C. S.]]></given-names>
</name>
<name>
<surname><![CDATA[Thomborson]]></surname>
<given-names><![CDATA[C]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Watermarking, tamper-proofing, and obfuscation-Tools for software protection]]></article-title>
<source><![CDATA[IEEE Transactions on Software Engineering]]></source>
<year>2002</year>
<volume>28</volume>
<numero>8</numero>
<issue>8</issue>
<page-range>735-46</page-range></nlm-citation>
</ref>
<ref id="B10">
<label>10.</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Main]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Oorschot]]></surname>
<given-names><![CDATA[P. V]]></given-names>
</name>
</person-group>
<source><![CDATA[Software Protection and Application Security: Understanding the Battleground ?]]></source>
<year>2003</year>
<conf-name><![CDATA[ International Course on State of the Art and Evolution of Computer Security and Industrial Cryptography]]></conf-name>
<conf-loc>Heverlee, Belgium </conf-loc>
</nlm-citation>
</ref>
<ref id="B11">
<label>11.</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Bai]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Shi]]></surname>
<given-names><![CDATA[Q.]]></given-names>
</name>
<name>
<surname><![CDATA[Mu]]></surname>
<given-names><![CDATA[S]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[A Malware and Variant Detection Method Using Function Call Graph Isomorphism]]></article-title>
<source><![CDATA[Security and Communication Networks]]></source>
<year>2010</year>
</nlm-citation>
</ref>
<ref id="B12">
<label>12.</label><nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Ahire]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
<name>
<surname><![CDATA[Abraham]]></surname>
<given-names><![CDATA[J]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Mechanisms for Source Code Obfuscation in C: Novel Techniques and Implementation]]></article-title>
<source><![CDATA[International Conference on Emerging Smart Computing and Informatics (ESCI)]]></source>
<year>2022</year>
<page-range>52-9</page-range><publisher-loc><![CDATA[Pune ]]></publisher-loc>
</nlm-citation>
</ref>
<ref id="B13">
<label>13.</label><nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Ikram]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Beaume]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
<name>
<surname><![CDATA[Kaafar]]></surname>
<given-names><![CDATA[M. A]]></given-names>
</name>
</person-group>
<source><![CDATA[DaDiDroid: An Obfuscation Resilient Tool for Detecting Android Malware via Weighted Directed Call Graph Modelling]]></source>
<year>2019</year>
</nlm-citation>
</ref>
<ref id="B14">
<label>14.</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Xu]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Wu]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
<name>
<surname><![CDATA[Qi]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Xu]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Zhang]]></surname>
<given-names><![CDATA[H.]]></given-names>
</name>
<name>
<surname><![CDATA[Ren]]></surname>
<given-names><![CDATA[Y.]]></given-names>
</name>
<name>
<surname><![CDATA[Zheng]]></surname>
<given-names><![CDATA[N]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[A similarity metric method of obfuscated malware using function-call graph]]></article-title>
<source><![CDATA[Journal of Computer Virology and Hacking Techniques]]></source>
<year>2013</year>
<volume>9</volume>
</nlm-citation>
</ref>
<ref id="B15">
<label>15.</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Cabrera Arteaga]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Monperrus]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Toady]]></surname>
<given-names><![CDATA[T.]]></given-names>
</name>
<name>
<surname><![CDATA[Baudry]]></surname>
<given-names><![CDATA[B]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[WebAssembly diversification for malware evasion]]></article-title>
<source><![CDATA[Computers &amp; Security]]></source>
<year>2023</year>
<volume>131</volume>
</nlm-citation>
</ref>
<ref id="B16">
<label>16.</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Rodríguez Véliz]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Núñez Musa]]></surname>
<given-names><![CDATA[Y.]]></given-names>
</name>
<name>
<surname><![CDATA[Sepúlveda Lima]]></surname>
<given-names><![CDATA[R]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Call graph obfuscation and diversification: An approach]]></article-title>
<source><![CDATA[IET Information Security]]></source>
<year>2020</year>
<volume>14</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>241-52</page-range></nlm-citation>
</ref>
<ref id="B17">
<label>17.</label><nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Arutunian]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Hovhannisyan]]></surname>
<given-names><![CDATA[H.]]></given-names>
</name>
<name>
<surname><![CDATA[Vardanyan]]></surname>
<given-names><![CDATA[V.]]></given-names>
</name>
<name>
<surname><![CDATA[Sargsyan]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Kurmangaleev]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Aslanyan]]></surname>
<given-names><![CDATA[H]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[A method to evaluate binary code comparison tools]]></article-title>
<source><![CDATA[Ivannikov Memorial Workshop]]></source>
<year>2021</year>
<page-range>145-7</page-range><publisher-loc><![CDATA[Yerevan, Armenia ]]></publisher-loc>
</nlm-citation>
</ref>
<ref id="B18">
<label>18.</label><nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Cappaert]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Preneel]]></surname>
<given-names><![CDATA[B]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[A general model for hiding control flow]]></article-title>
<source><![CDATA[Proceedings of the tenth annual ACM workshop on digital rights management]]></source>
<year>2010</year>
<page-range>35-42</page-range></nlm-citation>
</ref>
<ref id="B19">
<label>19.</label><nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Gnaytuk]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Kinzeryavgy]]></surname>
<given-names><![CDATA[V.]]></given-names>
</name>
<name>
<surname><![CDATA[Stepanenko]]></surname>
<given-names><![CDATA[I]]></given-names>
</name>
</person-group>
<source><![CDATA[Code obsfusaction tecnique for enhacing software protection against reverse engineering]]></source>
<year>2020</year>
<page-range>571-80</page-range></nlm-citation>
</ref>
</ref-list>
</back>
</article>
