Computer Science ›› 2019, Vol. 46 ›› Issue (4): 197-202.doi: 10.11896/j.issn.1002-137X.2019.04.031

• Information Security • Previous Articles     Next Articles

Code Obfuscation Effectiveness Assessment Model Based on Nonlinear Fuzzy Matrices

SU Qing, LIN Ze-ming, LIN Zhi-yi, HUANG Jian-feng   

  1. School of Computers,Guangdong University of Technology,Guangzhou 510006,China
  • Received:2018-03-11 Online:2019-04-15 Published:2019-04-23

Abstract: In order to solve the problem of present code obfuscation assessment method for low level of the code obfuscation discrimination,this paper proposed a code obfuscation effectiveness assessment model based on nonlinear fuzzy matrices(MNLFM),and gave a proof of several MNLFM’s features,such as assessing rationality,monotonicity,continuity,highlighting.MNLFM can obviously improve the current situation of poor distinction in the field of obfuscation assessment.The model can be carried out by quantifying the assessment index parameters,determining the membership functions and constructing the nonlinear fuzzy matrices.A test case suite of Java program was set up and several code obfuscation technologies based on flatten control flow and opaque predicate were used to check the validation of the model.And then it was compared with other code obfuscation assessment models.The experimental results verify that MNLFM can compare the comprehensive complexity between the obfuscation codes and clearly distinguish the degree of different obfuscation algorithms for original code.

Key words: Code obfuscation algorithms, Code obfuscation assessment model, Highlight, Nonlinear fuzzy matrices

CLC Number: 

  • TP309.7
[1]GAO Y,CHEN Y Y.A Comparable Code Obfuscation Framework Measuring Efficiency Based on Abstract Interpretation[J].Chinese Journal of Computer,2007,30(5):806-814.(in Chinese) 高鹰,陈意云.基于抽象解释的代码迷惑有效性比较框架[J].计算机学报,2007,30(5):806-814.
[2]SHENEAMER A,ROY S,KALITA J.A Detection Framework for Semantic Code Clones and Obfuscated Code[J].Expert Systems with Applications,2017,97(1):405-420.
[3]ZHAO Y J,TANG Z Y,WANG N,et al.Evaluation of Code Obfuscating Transformation[J].Journal of Software,2012,23(3):700-711.(in Chinese) 赵玉洁,汤战勇,王妮,等.代码混淆算法有效性评估[J].软件学报,2012,23(3):700-711.
[4]CECCATO M,PENTA M,FALCARIN P,et al.A family of experiments to assess the effectiveness and efficiency of source code obfuscation techniques[J].Empirical Software Enginee-ring,2014,19(4):1040-1074.
[5]CECCATO M,PREDA M D,NAGRA J,et al.Trading-off security and performance in barrier slicing for remote software entrusting[J].Automated Software Engineering,2009,16(2):235-261.
[6]COLLBERG C,THOMBORSON C,LOW D.A Taxonomy of Obfuscating Transformations:TR:148[R].New Zealand:Department of Computer Science,University of Auckland,1997.
[7]BERTHOLON B,VARRETTE S,BOUVRY P.JShadObf:A JavaScript Obfuscator Based on Multi-Objective Optimization Algorithms[C]∥Proceeding of the IEEE International Confe-rence on Network & System Security.IEEE,2013.
[8]LIN S M,WU W M,TAO G H,et al.PCA-based code obfuscation effective comprehensive assessment model[J].Application Research of Computers,2016,33(9):2819-2822.(in Chinese) 林水明,吴伟民,陶桂华,等.基于主成分分析的代码混淆有效性综合评估模型[J].计算机应用研究,2016,33(9):2819-2822.
[9]XIE X,LIU F L,LU B,et al.Quantitative Evaluation for Effectiveness of Code Obfuscation Based on Multi-level Weighted Attributes[J].Computer Science,2015,42(3):167-173.(in Chinese) 谢鑫,刘粉林,芦斌,等.基于多层次属性加权的代码混淆有效性量化评估[J].计算机科学,2015,42(3):167-173.
[10]ZHANG X H,FENG Y J.A Nonlinear Fuzzy Comprehensive Assessment Model[J].System Engineering Theory and Practice,2005,25(10):54-59.(in Chinese) 张晓慧,冯英浚.一种非线性模糊综合评价模型[J].系统工程理论与实践,2005,25(10):54-59.
[11]ZIMMERMANN H J.Fuzzy Set Theory—and Its Applications[M].Netherlands:Kluwer Academic Publishers,1996.
[12]PARR B T.The Definitive ANTLR 4 Reference[M].The United States of America:Pragmatic Bookshelf,2013.
[1] WANG Jian-ming, CHEN Xiang-yu, YANG Zi-zhong, SHI Chen-yang, ZHANG Yu-hang, QIAN Zheng-kun. Influence of Different Data Augmentation Methods on Model Recognition Accuracy [J]. Computer Science, 2022, 49(6A): 418-423.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!