LAYERED OBFUSCATION: A TAXONOMY OF SOFTWARE OBFUSCATION TECHNIQUES FOR LAYERED SECURITY

Layered obfuscation: a taxonomy of software obfuscation techniques for layered security

Layered obfuscation: a taxonomy of software obfuscation techniques for layered security

Blog Article

Abstract Software obfuscation has been developed for over 30 years.A problem always confusing the communities is what security strength the technique can achieve.Nowadays, this problem becomes even harder as the software economy becomes more diversified.Inspired by the classic idea of layered security for risk management, we propose layered obfuscation as a promising way to realize reliable software obfuscation.Our concept is based on the fact that real-world software is usually complicated.

Merely applying one or several obfuscation approaches cubs foam finger in an ad-hoc way cannot achieve good obscurity.Layered obfuscation, on the other hand, aims to mitigate the risks of reverse 12n/1200 wella software engineering by integrating different obfuscation techniques as a whole solution.In the paper, we conduct a systematic review of existing obfuscation techniques based on the idea of layered obfuscation and develop a novel taxonomy of obfuscation techniques.Following our taxonomy hierarchy, the obfuscation strategies under different branches are orthogonal to each other.In this way, it can assist developers in choosing obfuscation techniques and designing layered obfuscation solutions based on their specific requirements.

Report this page