A4 Article in conference proceedings
A Survey on Aims and Environments of Diversification and Obfuscation in Software Security




List of Authors: Hosseinzadeh S, Rauti S, Laurén S, Mäkelä J, Holvitie J, Hyrynsalmi S, Leppänen V
Publisher: ACM
Place: New York
Publication year: 2016
Book title *: Proceedings of the 17th International Conference on Computer Systems and Technologies 2016
ISBN: 978-1-4503-4182-0

Abstract

Diversification and obfuscation methods are promising approaches used to secure software and prevent malware from functioning. Diversification makes each software instance unique so that malware attacks cannot rely on the knowledge of the program's execution environment and/or internal structure anymore. We present a systematic literature review on the state of-the-art of diversification and obfuscation research aiming to improve software security between 1993 and 2014. As the result of systematic search, in the final phase, 209 related papers were included in this study. In this study we focus on two specific research questions: what are the aims of diversification and obfuscation techniques and what are the environments they are applied to. The former question includes the languages and the execution environments that can benefit from these two techniques, while the second question presents the goals of the techniques and also the type of attacks they mitigate.


Last updated on 2019-30-01 at 00:47