M. Styugin, V. Zolotarev, A. Prokhorov, Roman Gorbil
{"title":"New approach to software code diversification in interpreted languages based on the moving target technology","authors":"M. Styugin, V. Zolotarev, A. Prokhorov, Roman Gorbil","doi":"10.1109/ICAICT.2016.7991694","DOIUrl":null,"url":null,"abstract":"The paper presents a method based on moving target technology for protecting software components of distributed systems. Practical implementation of this method is a code diversifier, which adds intermediary functions and inserts transformation of key variables into the program code. Theoretical analysis of the method presented here demonstrated its effectiveness even when an adversary had access to a application's program code. The diversifier presented below can also function in a mode of program code obfuscation, which was tested and demonstrated by the example of interpreted programming language functions. Metrics obtained from the program code after obfuscation, showed sufficient level of code modification for independent use in obfuscation mode.","PeriodicalId":446472,"journal":{"name":"2016 IEEE 10th International Conference on Application of Information and Communication Technologies (AICT)","volume":"290 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"5","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2016 IEEE 10th International Conference on Application of Information and Communication Technologies (AICT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICAICT.2016.7991694","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 5
Abstract
The paper presents a method based on moving target technology for protecting software components of distributed systems. Practical implementation of this method is a code diversifier, which adds intermediary functions and inserts transformation of key variables into the program code. Theoretical analysis of the method presented here demonstrated its effectiveness even when an adversary had access to a application's program code. The diversifier presented below can also function in a mode of program code obfuscation, which was tested and demonstrated by the example of interpreted programming language functions. Metrics obtained from the program code after obfuscation, showed sufficient level of code modification for independent use in obfuscation mode.