{"title":"Using of the forensic analyzing tools, code obfuscation","authors":"L. Vokorokos, Zuzana Dankovičová, L. Lescisin","doi":"10.1109/SAMI.2017.7880329","DOIUrl":null,"url":null,"abstract":"The main goal of this paper is analyzing the methods of code analysis and proposing the most appropriate methods of sample analysis, executing the process of analyzing the available online and offline analyzing tools and explore ways to prevent hiding malicious pieces of code into the source code. Another aim is to focus on what the obfuscation technique of source code has to offer. Obfuscation can be understood as the transformation of program into another program or special case of data coding. The main purpose of this technique is transform the program to prevent its subsequent analysis and understanding, while the functionality of the program is preserved. Because the code obfuscation is a low cost technique and does not affect portability, it represents one of the most promising methodologies for defending programs against malicious host attacks, as backed up by the increasing interest in this technology. The usual obfuscation approaches that are particularly used by metamorphic viruses are for example data flow and control flow obfuscation.","PeriodicalId":105599,"journal":{"name":"2017 IEEE 15th International Symposium on Applied Machine Intelligence and Informatics (SAMI)","volume":"78 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2017 IEEE 15th International Symposium on Applied Machine Intelligence and Informatics (SAMI)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/SAMI.2017.7880329","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2
Abstract
The main goal of this paper is analyzing the methods of code analysis and proposing the most appropriate methods of sample analysis, executing the process of analyzing the available online and offline analyzing tools and explore ways to prevent hiding malicious pieces of code into the source code. Another aim is to focus on what the obfuscation technique of source code has to offer. Obfuscation can be understood as the transformation of program into another program or special case of data coding. The main purpose of this technique is transform the program to prevent its subsequent analysis and understanding, while the functionality of the program is preserved. Because the code obfuscation is a low cost technique and does not affect portability, it represents one of the most promising methodologies for defending programs against malicious host attacks, as backed up by the increasing interest in this technology. The usual obfuscation approaches that are particularly used by metamorphic viruses are for example data flow and control flow obfuscation.