Refereed article in conference proceedings (A4)

A Survey on Aims and Environments of Diversification and Obfuscation in Software Security




List of AuthorsHosseinzadeh S, Rauti S, Laurén S, Mäkelä J, Holvitie J, Hyrynsalmi S, Leppänen V

EditorsBoris Rachev, Angel Smrikarov

Conference nameComputer Systems and Technologies

PublisherACM

PlaceNew York

Publication year2016

Book title *Proceedings of the 17th International Conference on Computer Systems and Technologies 2016

Title of seriesICPS: ACM International Conference Proceeding Series

Volume number1164

Start page113

End page120

ISBN978-1-4503-4182-0

DOIhttp://dx.doi.org/10.1145/2983468.2983479

URLhttp://doi.acm.org/10.1145/2983468.2983479


Abstract

Diversification and obfuscation methods are promising approaches used to secure software and prevent malware from functioning. Diversification makes each software instance unique so that malware attacks cannot rely on the knowledge of the program's execution environment and/or internal structure anymore. We present a systematic literature review on the state of-the-art of diversification and obfuscation research aiming to improve software security between 1993 and 2014. As the result of systematic search, in the final phase, 209 related papers were included in this study. In this study we focus on two specific research questions: what are the aims of diversification and obfuscation techniques and what are the environments they are applied to. The former question includes the languages and the execution environments that can benefit from these two techniques, while the second question presents the goals of the techniques and also the type of attacks they mitigate.


Last updated on 2021-24-06 at 10:20