A4 Article in conference proceedings

A Survey on Aims and Environments of Diversification and Obfuscation in Software Security

List of Authors: Hosseinzadeh S, Rauti S, Laurén S, Mäkelä J, Holvitie J, Hyrynsalmi S, Leppänen V

Conference name: Computer Systems and Technologies

Publisher: ACM

Place: New York

Publication year: 2016

Book title *: Proceedings of the 17th International Conference on Computer Systems and Technologies 2016

Title of series: ICPS: ACM International Conference Proceeding Series

Volume number: 1164

ISBN: 978-1-4503-4182-0

DOI: http://dx.doi.org/10.1145/2983468.2983479

URL: http://doi.acm.org/10.1145/2983468.2983479


Diversification and obfuscation methods are promising approaches used to secure software and prevent malware from functioning. Diversification makes each software instance unique so that malware attacks cannot rely on the knowledge of the program's execution environment and/or internal structure anymore. We present a systematic literature review on the state of-the-art of diversification and obfuscation research aiming to improve software security between 1993 and 2014. As the result of systematic search, in the final phase, 209 related papers were included in this study. In this study we focus on two specific research questions: what are the aims of diversification and obfuscation techniques and what are the environments they are applied to. The former question includes the languages and the execution environments that can benefit from these two techniques, while the second question presents the goals of the techniques and also the type of attacks they mitigate.

Last updated on 2021-24-06 at 10:20