A family of experiments to assess the effectiveness and efficiency of source code obfuscation techniques

Context: code obfuscation is intended to obstruct code understanding and, eventually, to delay malicious code changes and ultimately render it uneconomical. Although code understanding cannot be completely impeded, code obfuscation makes it more laborious and troublesome, so as to discourage or reta...

Full description

Saved in:
Bibliographic Details
Published inEmpirical software engineering : an international journal Vol. 19; no. 4; pp. 1040 - 1074
Main Authors Ceccato, Mariano, Di Penta, Massimiliano, Falcarin, Paolo, Ricca, Filippo, Torchiano, Marco, Tonella, Paolo
Format Journal Article
LanguageEnglish
Published Boston Springer US 01.08.2014
Springer Nature B.V
Subjects
Online AccessGet full text
ISSN1382-3256
1573-7616
1573-7616
DOI10.1007/s10664-013-9248-x

Cover

Abstract Context: code obfuscation is intended to obstruct code understanding and, eventually, to delay malicious code changes and ultimately render it uneconomical. Although code understanding cannot be completely impeded, code obfuscation makes it more laborious and troublesome, so as to discourage or retard code tampering. Despite the extensive adoption of obfuscation, its assessment has been addressed indirectly either by using internal metrics or taking the point of view of code analysis, e.g., considering the associated computational complexity. To the best of our knowledge, there is no publicly available user study that measures the cost of understanding obfuscated code from the point of view of a human attacker. Aim: this paper experimentally assesses the impact of code obfuscation on the capability of human subjects to understand and change source code. In particular, it considers code protected with two well-known code obfuscation techniques, i.e., identifier renaming and opaque predicates. Method: We have conducted a family of five controlled experiments, involving undergraduate and graduate students from four Universities. During the experiments, subjects had to perform comprehension or attack tasks on decompiled clients of two Java network-based applications, either obfuscated using one of the two techniques, or not. To assess and compare the obfuscation techniques, we measured the correctness and the efficiency of the performed task. Results: —at least for the tasks we considered—simpler techniques (i.e., identifier renaming) prove to be more effective than more complex ones (i.e., opaque predicates) in impeding subjects to complete attack tasks.
AbstractList Context: code obfuscation is intended to obstruct code understanding and, eventually, to delay malicious code changes and ultimately render it uneconomical. Although code understanding cannot be completely impeded, code obfuscation makes it more laborious and troublesome, so as to discourage or retard code tampering. Despite the extensive adoption of obfuscation, its assessment has been addressed indirectly either by using internal metrics or taking the point of view of code analysis, e.g., considering the associated computational complexity. To the best of our knowledge, there is no publicly available user study that measures the cost of understanding obfuscated code from the point of view of a human attacker. Aim: this paper experimentally assesses the impact of code obfuscation on the capability of human subjects to understand and change source code. In particular, it considers code protected with two well-known code obfuscation techniques, i.e., identifier renaming and opaque predicates. Method: We have conducted a family of five controlled experiments, involving undergraduate and graduate students from four Universities. During the experiments, subjects had to perform comprehension or attack tasks on decompiled clients of two Java network-based applications, either obfuscated using one of the two techniques, or not. To assess and compare the obfuscation techniques, we measured the correctness and the efficiency of the performed task. Results: —at least for the tasks we considered—simpler techniques (i.e., identifier renaming) prove to be more effective than more complex ones (i.e., opaque predicates) in impeding subjects to complete attack tasks.
Context: code obfuscation is intended to obstruct code understanding and, eventually, to delay malicious code changes and ultimately render it uneconomical. Although code understanding cannot be completely impeded, code obfuscation makes it more laborious and troublesome, so as to discourage or retard code tampering. Despite the extensive adoption of obfuscation, its assessment has been addressed indirectly either by using internal metrics or taking the point of view of code analysis, e.g., considering the associated computational complexity. To the best of our knowledge, there is no publicly available user study that measures the cost of understanding obfuscated code from the point of view of a human attacker. Aim: this paper experimentally assesses the impact of code obfuscation on the capability of human subjects to understand and change source code. In particular, it considers code protected with two well-known code obfuscation techniques, i.e., identifier renaming and opaque predicates. Method: We have conducted a family of five controlled experiments, involving undergraduate and graduate students from four Universities. During the experiments, subjects had to perform comprehension or attack tasks on decompiled clients of two Java network-based applications, either obfuscated using one of the two techniques, or not. To assess and compare the obfuscation techniques, we measured the correctness and the efficiency of the performed task. Results: -at least for the tasks we considered-simpler techniques (i.e., identifier renaming) prove to be more effective than more complex ones (i.e., opaque predicates) in impeding subjects to complete attack tasks.
Context: code obfuscation is intended to obstruct code understanding and, eventually, to delay malicious code changes and ultimately render it uneconomical. Although code understanding cannot be completely impeded, code obfuscation makes it more laborious and troublesome, so as to discourage or retard code tampering. Despite the extensive adoption of obfuscation, its assessment has been addressed indirectly either by using internal metrics or taking the point of view of code analysis, e.g., considering the associated computational complexity. To the best of our knowledge, there is no publicly available user study that measures the cost of understanding obfuscated code from the point of view of a human attacker. Aim: this paper experimentally assesses the impact of code obfuscation on the capability of human subjects to understand and change source code. In particular, it considers code protected with two well-known code obfuscation techniques, i.e., identifier renaming and opaque predicates. Method: We have conducted a family of five controlled experiments, involving undergraduate and graduate students from four Universities. During the experiments, subjects had to perform comprehension or attack tasks on decompiled clients of two Java network-based applications, either obfuscated using one of the two techniques, or not. To assess and compare the obfuscation techniques, we measured the correctness and the efficiency of the performed task. Results: --at least for the tasks we considered--simpler techniques (i.e., identifier renaming) prove to be more effective than more complex ones (i.e., opaque predicates) in impeding subjects to complete attack tasks.[PUBLICATION ABSTRACT]
Author Tonella, Paolo
Ceccato, Mariano
Di Penta, Massimiliano
Ricca, Filippo
Torchiano, Marco
Falcarin, Paolo
Author_xml – sequence: 1
  givenname: Mariano
  surname: Ceccato
  fullname: Ceccato, Mariano
  email: ceccato@fbk.eu
  organization: Cit, Fondazione Bruno Kessler
– sequence: 2
  givenname: Massimiliano
  surname: Di Penta
  fullname: Di Penta, Massimiliano
  organization: Department of Engineering, University of Sannio
– sequence: 3
  givenname: Paolo
  surname: Falcarin
  fullname: Falcarin, Paolo
  organization: School of Architecture, Computing and Engineering, University of East London
– sequence: 4
  givenname: Filippo
  surname: Ricca
  fullname: Ricca, Filippo
  organization: DIBRIS, University of Genova
– sequence: 5
  givenname: Marco
  surname: Torchiano
  fullname: Torchiano, Marco
  organization: Politecnico di Torino
– sequence: 6
  givenname: Paolo
  surname: Tonella
  fullname: Tonella, Paolo
  organization: Cit, Fondazione Bruno Kessler
BookMark eNqNkEtPxCAUhYnRxOcPcEfixk0VKKV0aYyvZBI3uiaUXhxMB8ZCdebfS51ZGBONK24u54NzziHa9cEDQqeUXFBC6stIiRC8ILQsGsZlsdpBB7Sqy6IWVOzmuZSsKFkl9tFhjK-EkKbm1QGaX2GrF65f42AxrJYwuAX4FHEKWMcIMU9zwGAtmOTewU8b7btp44wDb77IGMbBADahAxxaO0ajkwseJzBz795GiMdoz-o-wsn2PELPtzdP1_fF7PHu4fpqVhheyVTIpmxZV7acaclJK0xLiJXSWGlb3pHOiEaAoMR2LQMNpKIaNIV8A6bmvC2PENu8O_qlXn_ovlfLnEkPa0WJmrpSm65U7kpNXalVhs430HIIk9mkFi4a6HvtIYxR0aqipOE1o1l69kP6mrP7HCmrWCUbJgXPKrpRmSHEOID9l4n6B2Nc-qoxDdr1f5LbzDH_4l9g-ObpV-gTIYetWA
CitedBy_id crossref_primary_10_1007_s10664_017_9563_8
crossref_primary_10_1007_s10664_014_9321_0
crossref_primary_10_1145_2629457
crossref_primary_10_1007_s10664_023_10339_2
crossref_primary_10_15622_ia_23_3_3
crossref_primary_10_1007_s10664_022_10160_3
crossref_primary_10_1145_3577198
crossref_primary_10_1145_2699696
Cites_doi 10.1016/j.infsof.2008.01.007
10.1109/TSE.2009.69
10.1145/1314257.1314263
10.1145/268946.268962
10.1007/978-1-4757-3304-4
10.1016/S0164-1212(98)10058-4
10.1109/MS.2011.34
10.1016/j.cose.2005.11.002
10.1109/TSE.2003.1183929
10.1016/j.scico.2006.04.002
10.1109/ICPC.2009.5090041
10.1007/3-540-44456-4_7
10.1007/3-540-47870-1_10
10.1007/3-540-47870-1_9
10.1109/SCAM.2007.27
10.1145/1368088.1368138
10.4135/9781412983327
10.1109/WCRE.2005.13
10.1109/ARES.2008.21
10.1109/AINA.2006.286
10.1007/978-1-4615-4625-2
ContentType Journal Article
Copyright Springer Science+Business Media New York 2013
Springer Science+Business Media New York 2014
Copyright_xml – notice: Springer Science+Business Media New York 2013
– notice: Springer Science+Business Media New York 2014
DBID AAYXX
CITATION
7SC
8FD
8FE
8FG
ABJCF
AFKRA
ARAPS
BENPR
BGLVJ
CCPQU
DWQXO
HCIFZ
JQ2
L6V
L7M
L~C
L~D
M7S
P5Z
P62
PHGZM
PHGZT
PKEHL
PQEST
PQGLB
PQQKQ
PQUKI
PRINS
PTHSS
S0W
ADTOC
UNPAY
DOI 10.1007/s10664-013-9248-x
DatabaseName CrossRef
Computer and Information Systems Abstracts
Technology Research Database
ProQuest SciTech Collection
ProQuest Technology Collection
Materials Science & Engineering Collection
ProQuest Central UK/Ireland
Advanced Technologies & Computer Science Collection
ProQuest Central
Technology Collection (via ProQuest SciTech Premium Collection)
ProQuest One
ProQuest Central
SciTech Premium Collection
ProQuest Computer Science Collection
ProQuest Engineering Collection
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts – Academic
Computer and Information Systems Abstracts Professional
Engineering Database
Advanced Technologies & Aerospace Database
ProQuest Advanced Technologies & Aerospace Collection
ProQuest Central Premium
ProQuest One Academic
ProQuest One Academic Middle East (New)
ProQuest One Academic Eastern Edition (DO NOT USE)
ProQuest One Applied & Life Sciences
ProQuest One Academic
ProQuest One Academic UKI Edition
ProQuest Central China
Engineering Collection
DELNET Engineering & Technology Collection
Unpaywall for CDI: Periodical Content
Unpaywall
DatabaseTitle CrossRef
Technology Collection
Technology Research Database
Computer and Information Systems Abstracts – Academic
ProQuest One Academic Middle East (New)
ProQuest Advanced Technologies & Aerospace Collection
ProQuest Computer Science Collection
Computer and Information Systems Abstracts
SciTech Premium Collection
ProQuest One Community College
ProQuest Central China
ProQuest Central
ProQuest One Applied & Life Sciences
ProQuest Engineering Collection
ProQuest Central Korea
ProQuest Central (New)
Advanced Technologies Database with Aerospace
Engineering Collection
Advanced Technologies & Aerospace Collection
Engineering Database
ProQuest One Academic Eastern Edition
ProQuest Technology Collection
ProQuest SciTech Collection
Computer and Information Systems Abstracts Professional
Advanced Technologies & Aerospace Database
ProQuest One Academic UKI Edition
ProQuest DELNET Engineering and Technology Collection
Materials Science & Engineering Collection
ProQuest One Academic
ProQuest One Academic (New)
DatabaseTitleList
Computer and Information Systems Abstracts
Technology Collection
Database_xml – sequence: 1
  dbid: UNPAY
  name: Unpaywall
  url: https://proxy.k.utb.cz/login?url=https://unpaywall.org/
  sourceTypes: Open Access Repository
– sequence: 2
  dbid: 8FG
  name: ProQuest Technology Collection
  url: https://search.proquest.com/technologycollection1
  sourceTypes: Aggregation Database
DeliveryMethod fulltext_linktorsrc
Discipline Computer Science
EISSN 1573-7616
EndPage 1074
ExternalDocumentID oai:iris.unive.it:10278/3746441
3307848401
10_1007_s10664_013_9248_x
Genre Feature
GroupedDBID -4Z
-59
-5G
-BR
-EM
-Y2
-~C
.86
.DC
.VR
06D
0R~
0VY
199
1N0
1SB
2.D
203
28-
29G
2J2
2JN
2JY
2KG
2LR
2P1
2VQ
2~H
30V
4.4
406
408
409
40D
40E
5GY
5QI
5VS
67Z
6NX
78A
8FE
8FG
8TC
8UJ
95-
95.
95~
96X
AABHQ
AACDK
AAHNG
AAIAL
AAJBT
AAJKR
AANZL
AAOBN
AARHV
AARTL
AASML
AATNV
AATVU
AAUYE
AAWCG
AAYIU
AAYOK
AAYQN
AAYTO
AAYZH
ABAKF
ABBBX
ABBXA
ABDZT
ABECU
ABFTD
ABFTV
ABHLI
ABHQN
ABJCF
ABJNI
ABJOX
ABKCH
ABKTR
ABMNI
ABMQK
ABNWP
ABQBU
ABQSL
ABSXP
ABTEG
ABTHY
ABTKH
ABTMW
ABULA
ABWNU
ABXPI
ACAOD
ACBXY
ACDTI
ACGFS
ACHSB
ACHXU
ACIWK
ACKNC
ACMDZ
ACMLO
ACOKC
ACOMO
ACPIV
ACSNA
ACZOJ
ADHHG
ADHIR
ADIMF
ADINQ
ADKNI
ADKPE
ADRFC
ADTPH
ADURQ
ADYFF
ADZKW
AEBTG
AEFIE
AEFQL
AEGAL
AEGNC
AEJHL
AEJRE
AEKMD
AEMSY
AENEX
AEOHA
AEPYU
AESKC
AETLH
AEVLU
AEXYK
AFBBN
AFEXP
AFGCZ
AFKRA
AFLOW
AFQWF
AFWTZ
AFZKB
AGAYW
AGDGC
AGGDS
AGJBK
AGMZJ
AGQEE
AGQMX
AGRTI
AGWIL
AGWZB
AGYKE
AHAVH
AHBYD
AHKAY
AHSBF
AHYZX
AIAKS
AIGIU
AIIXL
AILAN
AITGF
AJBLW
AJRNO
AJZVZ
ALMA_UNASSIGNED_HOLDINGS
ALWAN
AMKLP
AMXSW
AMYLF
AMYQR
AOCGG
ARAPS
ARMRJ
ASPBG
AVWKF
AXYYD
AYJHY
AZFZN
B-.
BA0
BBWZM
BDATZ
BENPR
BGLVJ
BGNMA
BSONS
CAG
CCPQU
COF
CS3
CSCUP
DDRTE
DL5
DNIVK
DPUIP
DU5
EBLON
EBS
EIOEI
EJD
ESBYG
FEDTE
FERAY
FFXSO
FIGPU
FINBP
FNLPD
FRRFC
FSGXE
FWDCC
GGCAI
GGRSB
GJIRD
GNWQR
GQ6
GQ7
GQ8
GXS
H13
HCIFZ
HF~
HG5
HG6
HMJXF
HQYDN
HRMNR
HVGLF
HZ~
I09
IHE
IJ-
IKXTQ
ITM
IWAJR
IXC
IZIGR
IZQ
I~X
I~Z
J-C
J0Z
JBSCW
JCJTX
JZLTJ
KDC
KOV
KOW
L6V
LAK
LLZTM
M4Y
M7S
MA-
N2Q
NB0
NDZJH
NPVJJ
NQJWS
NU0
O9-
O93
O9G
O9I
O9J
OAM
P19
P62
P9O
PF0
PT4
PT5
PTHSS
Q2X
QOK
QOS
R4E
R89
R9I
RHV
RNI
RNS
ROL
RPX
RSV
RZC
RZE
RZK
S0W
S16
S1Z
S26
S27
S28
S3B
SAP
SCJ
SCLPG
SCO
SDH
SDM
SHX
SISQX
SJYHP
SNE
SNPRN
SNX
SOHCF
SOJ
SPISZ
SRMVM
SSLCW
STPWE
SZN
T13
T16
TSG
TSK
TSV
TUC
U2A
UG4
UOJIU
UTJUX
UZXMN
VC2
VFIZW
W23
W48
WK8
YLTOR
Z45
Z7R
Z7S
Z7V
Z7X
Z7Z
Z81
Z83
Z86
Z88
Z8M
Z8N
Z8P
Z8R
Z8T
Z8U
Z8W
Z92
ZMTXR
~EX
AAPKM
AAYXX
ABBRH
ABDBE
ABFSG
ABRTQ
ACSTC
ADHKG
AEZWR
AFDZB
AFHIU
AGQPQ
AHPBZ
AHWEU
AIXLP
ATHPR
AYFIA
CITATION
PHGZM
PHGZT
PQGLB
PUEGO
7SC
8FD
DWQXO
JQ2
L7M
L~C
L~D
PKEHL
PQEST
PQQKQ
PQUKI
PRINS
ADTOC
AFOHR
UNPAY
ID FETCH-LOGICAL-c458t-893b2d3b42a840b6cb00f88cf8fb4d0dc696e610fdb2eae051aea1ed0dec744b3
IEDL.DBID AGYKE
ISSN 1382-3256
1573-7616
IngestDate Sun Oct 26 04:13:58 EDT 2025
Fri Sep 05 08:08:16 EDT 2025
Fri Jul 25 11:19:48 EDT 2025
Wed Oct 01 04:12:34 EDT 2025
Thu Apr 24 23:07:25 EDT 2025
Fri Feb 21 02:35:45 EST 2025
IsDoiOpenAccess true
IsOpenAccess true
IsPeerReviewed true
IsScholarly true
Issue 4
Keywords Software obfuscation
Program comprehension
Empirical studies
Language English
License http://www.springer.com/tdm
other-oa
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c458t-893b2d3b42a840b6cb00f88cf8fb4d0dc696e610fdb2eae051aea1ed0dec744b3
Notes SourceType-Scholarly Journals-1
ObjectType-Feature-1
content type line 14
ObjectType-Article-2
content type line 23
OpenAccessLink https://proxy.k.utb.cz/login?url=http://hdl.handle.net/10278/3746441
PQID 1525892864
PQPubID 326341
PageCount 35
ParticipantIDs unpaywall_primary_10_1007_s10664_013_9248_x
proquest_miscellaneous_1551094721
proquest_journals_1525892864
crossref_primary_10_1007_s10664_013_9248_x
crossref_citationtrail_10_1007_s10664_013_9248_x
springer_journals_10_1007_s10664_013_9248_x
ProviderPackageCode CITATION
AAYXX
PublicationCentury 2000
PublicationDate 2014-08-01
PublicationDateYYYYMMDD 2014-08-01
PublicationDate_xml – month: 08
  year: 2014
  text: 2014-08-01
  day: 01
PublicationDecade 2010
PublicationPlace Boston
PublicationPlace_xml – name: Boston
– name: Dordrecht
PublicationSubtitle An International Journal
PublicationTitle Empirical software engineering : an international journal
PublicationTitleAbbrev Empir Software Eng
PublicationYear 2014
Publisher Springer US
Springer Nature B.V
Publisher_xml – name: Springer US
– name: Springer Nature B.V
References Oppenheim (CR23) 1992
Ricca, Di Penta, Torchiano, Tonella, Ceccato (CR25) 2010; 36
CR19
CR18
CR17
CR15
Collberg, Thomborson, Low (CR10) 1998
Sutherland, Kalb, Blyth, Mulley (CR30) 2006; 25
CR12
CR33
Anckaert, Madou, Sutter, Bus, Bosschere, Preneel (CR1) 2007
CR32
CR31
Juristo, Moreno (CR21) 2001
Falcarin, Collberg, Atallah, Jakubowski (CR14) 2011; 28
CR2
CR4
CR3
CR6
CR5
CR8
CR29
CR28
Cohen (CR7) 1988
CR9
CR26
CR24
CR22
Cordy (CR11) 2006; 61
Eisenbarth, Koschke, Simon (CR13) 2003; 29
Fiutem, Tonella, Antoniol, Merlo (CR16) 1999; 44
CR20
Ricca, Torchiano, Di Penta, Ceccato, Tonella (CR27) 2009; 51
F Ricca (9248_CR25) 2010; 36
P Falcarin (9248_CR14) 2011; 28
9248_CR31
J Cohen (9248_CR7) 1988
9248_CR8
9248_CR15
F Ricca (9248_CR27) 2009; 51
9248_CR6
9248_CR17
9248_CR5
9248_CR4
9248_CR33
9248_CR3
9248_CR32
9248_CR2
9248_CR12
I Sutherland (9248_CR30) 2006; 25
9248_CR19
9248_CR18
9248_CR9
C Collberg (9248_CR10) 1998
AN Oppenheim (9248_CR23) 1992
9248_CR20
J Cordy (9248_CR11) 2006; 61
T Eisenbarth (9248_CR13) 2003; 29
B Anckaert (9248_CR1) 2007
9248_CR26
9248_CR28
R Fiutem (9248_CR16) 1999; 44
9248_CR22
9248_CR24
N Juristo (9248_CR21) 2001
9248_CR29
References_xml – ident: CR22
– ident: CR18
– year: 1988
  ident: CR7
  publication-title: Statistical power analysis for the behavioral sciences
– ident: CR4
– volume: 51
  start-page: 270
  year: 2009
  end-page: 283
  ident: CR27
  article-title: Using acceptance tests as a support for clarifying requirements: a series of experiments
  publication-title: Inf Softw Technol
  doi: 10.1016/j.infsof.2008.01.007
– ident: CR2
– ident: CR12
– ident: CR33
– ident: CR6
– ident: CR29
– ident: CR8
– volume: 36
  start-page: 96
  year: 2010
  end-page: 118
  ident: CR25
  article-title: How developers’ experience and ability influence web application comprehension tasks supported by UML stereotypes: a series of four experiments
  publication-title: IEEE Trans Softw Eng
  doi: 10.1109/TSE.2009.69
– start-page: 15
  year: 2007
  end-page: 20
  ident: CR1
  article-title: Program obfuscation: a quantitative approach
  publication-title: QoP ’07: Proc. of the 2007 ACM workshop on quality of protection
  doi: 10.1145/1314257.1314263
– ident: CR19
– start-page: 184
  year: 1998
  end-page: 196
  ident: CR10
  article-title: Manufacturing cheap, resilient, and stealthy opaque constructs
  publication-title: POPL ’98: Proceedings of the 25th ACM SIGPLAN-SIGACT symposium on principles of programming languages
  doi: 10.1145/268946.268962
– year: 2001
  ident: CR21
  publication-title: Basics of software engineering experimentation
  doi: 10.1007/978-1-4757-3304-4
– volume: 44
  start-page: 213
  issue: 3
  year: 1999
  end-page: 227
  ident: CR16
  article-title: Points-to analysis for program understanding
  publication-title: J Syst Softw
  doi: 10.1016/S0164-1212(98)10058-4
– ident: CR3
– volume: 28
  start-page: 24
  issue: 2
  year: 2011
  end-page: 27
  ident: CR14
  article-title: Guest editors’ introduction: software protection
  publication-title: IEEE Softw
  doi: 10.1109/MS.2011.34
– ident: CR15
– ident: CR17
– ident: CR31
– ident: CR9
– year: 1992
  ident: CR23
  publication-title: Questionnaire design, interviewing and attitude measurement
– volume: 25
  start-page: 221
  issue: 3
  year: 2006
  end-page: 228
  ident: CR30
  article-title: An empirical examination of the reverse engineering process for binary files
  publication-title: Comput Secur
  doi: 10.1016/j.cose.2005.11.002
– ident: CR32
– ident: CR5
– volume: 29
  start-page: 195
  issue: 3
  year: 2003
  end-page: 209
  ident: CR13
  article-title: Locating features in source code
  publication-title: IEEE Trans Softw Eng
  doi: 10.1109/TSE.2003.1183929
– ident: CR28
– ident: CR26
– ident: CR24
– volume: 61
  start-page: 190
  issue: 3
  year: 2006
  end-page: 210
  ident: CR11
  article-title: The TXL source transformation language
  publication-title: Sci Comput Program
  doi: 10.1016/j.scico.2006.04.002
– ident: CR20
– ident: 9248_CR3
  doi: 10.1109/ICPC.2009.5090041
– volume: 29
  start-page: 195
  issue: 3
  year: 2003
  ident: 9248_CR13
  publication-title: IEEE Trans Softw Eng
  doi: 10.1109/TSE.2003.1183929
– volume: 36
  start-page: 96
  year: 2010
  ident: 9248_CR25
  publication-title: IEEE Trans Softw Eng
  doi: 10.1109/TSE.2009.69
– volume: 51
  start-page: 270
  year: 2009
  ident: 9248_CR27
  publication-title: Inf Softw Technol
  doi: 10.1016/j.infsof.2008.01.007
– ident: 9248_CR17
  doi: 10.1007/3-540-44456-4_7
– ident: 9248_CR6
  doi: 10.1007/3-540-47870-1_10
– ident: 9248_CR19
  doi: 10.1007/3-540-47870-1_9
– volume-title: Basics of software engineering experimentation
  year: 2001
  ident: 9248_CR21
  doi: 10.1007/978-1-4757-3304-4
– ident: 9248_CR18
– volume: 25
  start-page: 221
  issue: 3
  year: 2006
  ident: 9248_CR30
  publication-title: Comput Secur
  doi: 10.1016/j.cose.2005.11.002
– start-page: 184
  volume-title: POPL ’98: Proceedings of the 25th ACM SIGPLAN-SIGACT symposium on principles of programming languages
  year: 1998
  ident: 9248_CR10
  doi: 10.1145/268946.268962
– ident: 9248_CR5
  doi: 10.1109/SCAM.2007.27
– ident: 9248_CR2
– volume: 61
  start-page: 190
  issue: 3
  year: 2006
  ident: 9248_CR11
  publication-title: Sci Comput Program
  doi: 10.1016/j.scico.2006.04.002
– ident: 9248_CR26
  doi: 10.1145/1368088.1368138
– ident: 9248_CR8
– ident: 9248_CR20
  doi: 10.4135/9781412983327
– ident: 9248_CR31
– volume-title: Questionnaire design, interviewing and attitude measurement
  year: 1992
  ident: 9248_CR23
– ident: 9248_CR29
– ident: 9248_CR12
– start-page: 15
  volume-title: QoP ’07: Proc. of the 2007 ACM workshop on quality of protection
  year: 2007
  ident: 9248_CR1
  doi: 10.1145/1314257.1314263
– ident: 9248_CR32
  doi: 10.1109/WCRE.2005.13
– volume: 44
  start-page: 213
  issue: 3
  year: 1999
  ident: 9248_CR16
  publication-title: J Syst Softw
  doi: 10.1016/S0164-1212(98)10058-4
– ident: 9248_CR22
– ident: 9248_CR28
  doi: 10.1109/ARES.2008.21
– volume: 28
  start-page: 24
  issue: 2
  year: 2011
  ident: 9248_CR14
  publication-title: IEEE Softw
  doi: 10.1109/MS.2011.34
– ident: 9248_CR15
  doi: 10.1109/AINA.2006.286
– ident: 9248_CR24
– volume-title: Statistical power analysis for the behavioral sciences
  year: 1988
  ident: 9248_CR7
– ident: 9248_CR9
– ident: 9248_CR4
  doi: 10.1109/ICPC.2009.5090041
– ident: 9248_CR33
  doi: 10.1007/978-1-4615-4625-2
SSID ssj0009745
Score 2.3394623
Snippet Context: code obfuscation is intended to obstruct code understanding and, eventually, to delay malicious code changes and ultimately render it uneconomical....
Context: code obfuscation is intended to obstruct code understanding and, eventually, to delay malicious code changes and ultimately render it uneconomical....
SourceID unpaywall
proquest
crossref
springer
SourceType Open Access Repository
Aggregation Database
Enrichment Source
Index Database
Publisher
StartPage 1040
SubjectTerms Assessments
Compilers
Computer Science
Delay
Graduates
Human
Interpreters
Networks
Programming Languages
Software Engineering/Programming and Operating Systems
Source code
Students
Tasks
SummonAdditionalLinks – databaseName: ProQuest Central
  dbid: BENPR
  link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwhV3NS8MwFH_M7aAe_BanUyJ4cgTdmqXtQWTKxvAwRBzsVpI2QWG007U4_3tf-jkPzmvTpKEvL_m9j_wewJXtCotxrqnlakUZIm4qGdo8eLp2tNXR2tZptsWYjybsadqb1mBc3IUxaZXFnphu1EHkGx_5janT47hdh7P7-Qc1VaNMdLUooSHy0grBXUoxtgGNrmHGqkPjYTB-fqloeO20bLEh3qMWzqeIc2aX6Tg3GRkWRZvEocvfJ1UFP8uI6TZsJuFcfH-J2WzlUBruwU6OJkk_E_8-1FR4ALtFpQaSK-4hvPVJ5skgkSYVqf-CxBERadiXIBAkWXJHvv8REQbmyXs6SNoz8_QTcw2eRFIni8zfR0oi2MURTIaD18cRzWssUJ_1nJgiXJHdwEL5CDT1JPdRDbXj-NrRkgW3gc9drhBi6UB2lVCowkKJjsIW5duMSesY6mEUqhMgeND1XO76ti0lQytGCoZ4wkYDkttCWb0m3Bb_0_NzAnJTB2PmVdTJRgQeisAzIvCWTbguu8wz9o11L7cKIXm5Ii68atk04bJsRhUycRERqigx7-DG5DK0hZvQLoS7MsTfH2yX8v9_eqfrp3cGW4jFWJZb2IJ6_Jmoc8Q7sbzIF_EPtn78XQ
  priority: 102
  providerName: ProQuest
– databaseName: Unpaywall
  dbid: UNPAY
  link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1Lb9swDCay5LD10Me2oukLGtDTCnVxJEv2MWgbBD0UPSxAdjIkR8KGBnbQ2Fi3Xz_Ksp10w1r0aj1sg6L4fSJFApzJWDEuhKUstoZyRNxUc-Q8aF0DywJrpa2iLW7FZMpvZuGsA03Bu7_SCwTOL_aFSe6s9hvoiRABdxd609u70beKSiE-ZMOqRmsQSkaRlIvGd-kvyAnhoiwYRZ4R0cen1mcNKVsv6Ba8LbOl-vVTLRYbhma8A1fNdR0fX3J_URb6Iv39b_bG5_5hF7ZroElGfmXsQcdk72GnKeJAap3-AN9HxB9ykNySdb7_FSlyoiqPMEGMSHzcR701Enyve_KjmqQa6Z0AxN2QJ7m25cofBZI2R-zqI0zH118vJ7Quv0BTHkYFRSSjh3OGolPIArVIUUNtFKU2sprPB_NUxMIg-rJzPTTKoHYrowKDLSaVnGu2D90sz8wBELSBKLk4lVJrjgRHK45QQyK3FFIZFvZh0IglSevc5K5ExiJZZ1V2kkxQkomTZPLYh8_tkKVPzPFc5-NG1kmto6vEVX6K4mEkeB8-tc2oXc5lojKTl64P7lkxR5rch_NmjWxM8f8XnrfL6OXPO3xV7yN4h6iN-yjEY-gWD6U5QWRU6NNaM_4A7fUF7w
  priority: 102
  providerName: Unpaywall
Title A family of experiments to assess the effectiveness and efficiency of source code obfuscation techniques
URI https://link.springer.com/article/10.1007/s10664-013-9248-x
https://www.proquest.com/docview/1525892864
https://www.proquest.com/docview/1551094721
http://hdl.handle.net/10278/3746441
UnpaywallVersion submittedVersion
Volume 19
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVLSH
  databaseName: SpringerLink Journals
  customDbUrl:
  mediaType: online
  eissn: 1573-7616
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0009745
  issn: 1573-7616
  databaseCode: AFBBN
  dateStart: 19970301
  isFulltext: true
  providerName: Library Specific Holdings
– providerCode: PRVPQU
  databaseName: ProQuest Central
  customDbUrl: http://www.proquest.com/pqcentral?accountid=15518
  eissn: 1573-7616
  dateEnd: 20151231
  omitProxy: true
  ssIdentifier: ssj0009745
  issn: 1573-7616
  databaseCode: BENPR
  dateStart: 19970301
  isFulltext: true
  titleUrlDefault: https://www.proquest.com/central
  providerName: ProQuest
– providerCode: PRVPQU
  databaseName: ProQuest Technology Collection
  customDbUrl:
  eissn: 1573-7616
  dateEnd: 20151231
  omitProxy: true
  ssIdentifier: ssj0009745
  issn: 1573-7616
  databaseCode: 8FG
  dateStart: 19970301
  isFulltext: true
  titleUrlDefault: https://search.proquest.com/technologycollection1
  providerName: ProQuest
– providerCode: PRVAVX
  databaseName: SpringerLINK - Czech Republic Consortium
  customDbUrl:
  eissn: 1573-7616
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0009745
  issn: 1573-7616
  databaseCode: AGYKE
  dateStart: 19970101
  isFulltext: true
  titleUrlDefault: http://link.springer.com
  providerName: Springer Nature
– providerCode: PRVAVX
  databaseName: SpringerLink Journals (ICM)
  customDbUrl:
  eissn: 1573-7616
  dateEnd: 99991231
  omitProxy: true
  ssIdentifier: ssj0009745
  issn: 1573-7616
  databaseCode: U2A
  dateStart: 19970101
  isFulltext: true
  titleUrlDefault: http://www.springerlink.com/journals/
  providerName: Springer Nature
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV3dS8MwED90PqgPfovTOSL4pETcmqXtY5VNURgiDvSpJG2C4mjFtvjx13vp16b4gU-lzWeTXO53ucsdwL7tCotxrqnlakUZIm4qGco8yF072upobevc2mLIz0fs4rZ3W97jTipr90olme_UU5fdODcWExZFmcGhCBzncndbDZjzzu4u-xNfu3Yem9h416MWNlopM7-r5DM7mmDMWi26CPNZ9CTeXsR4PMV5BstwU_W5MDh5PMpSeRS8f3Hn-M-fWoGlEokSr1g6qzCjojVYrqI8kJLo1-HeI8UpCIk1mQQESEgaE5GrjAmCSFIYhpR7JxFRaL485JXkJQstATFX6EksdZYUZ4WkdiKbbMBo0L85PadlfAYasJ6TUoQ6shtaOLcCxUTJAyRh7TiBdrRk4XEYcJcrhGc6lF0lFJK_UKKjMEUFNmPS2oRGFEdqCwgyyZ7L3cC2pWQoAUnBEIvYKHxyWyir14Tjapr8oHRebmJojP2J22Uzkj6OpG9G0n9twkFd5Knw3PFb5lY1935JxIlvQkM5btfhrAl7dTKSn9GpiEjFmcmDm5rLUI5uwmE1xVNV_NzgYb2s_u7e9r_q3oEFhHWsMFNsQSN9ztQuQqdUtmHWGZy1S4LB50l_eHWNX0ddD99Gwyvv7gOQfRUd
linkProvider Springer Nature
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV1LT9wwEB5ROFAOtOUhlleNRC9FFrux10kOqAIKWgqsqgokbsFObIG0ShayK3b_HL-NceIk9FB64hrHjuOx5-F5fAC7figZF8JQFhpNOWrcVHG0eVC6dgzrGOObItqiL3rX_NdN92YGnqtcGBtWWfHEglEnWWzvyPctTk8QeoHgP4YP1KJGWe9qBaEhHbRCclCUGHOJHed6-oQmXH5w9hPp_c3zTk-ujnvUoQzQmHeDEUWBrbyE4QwlGjtKWMh6EwSxCYziSTuJRSg0KhkmUZ6WGjex1LKjsUXHPueK4bgfYI4zHqLxN3d00v_9pyn76xcwybbQH2X4_5VftUzeE8JGgDCKNlBAJ39LxkbdrT20CzA_Tody-iQHg1dC8PQzLDrtlRyW2-0LzOh0CT5VyBDEMYpluDsk5c0JyQxpQARyMsqILNzMBBVPUgaTOH5LZJrYJ_fFIEXP0rNAbNo9yZQZ5-X9IqkLz-YrcP0uq70Ks2mW6jUgKFi7oQhj31eKo9WkJEf9xUeDVfhSs24L2tV6RrEreG5xNwZRU6rZkiBCEkSWBNGkBd_rLsOy2sdbL29WRIrcwc-jZpu2YKduxiNr_TAy1dnYvoOMMORoe7dgryLuqyH-_cG9mv7_n97629P7CvO9q8uL6OKsf74BH1EP5GVc4ybMjh7Hegt1rZHadhuawO17n6EXKcE7pA
linkToPdf http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV1LT9wwEB5RkFo4QB8glkfrSu2lyIJNvHZyQAgBWygV6qFI3FI7sdVKq2QhuwL-Gr-OmTgPOEBPXOPYcTzjeXjG8wF8UbEOhZSOh7GzXKDFzY1Anwe1a9-FfeeUq7ItzuTxufhxMbiYgbvmLgylVTYysRLUWZHSGfk24fREcRBJse3qtIhfh8O98SUnBCmKtDZwGp5FTu3tNbpv5e7JIdL6axAMj34fHPMaYYCnYhBNOCprE2Qhzk6jo2MkwdW7KEpd5IzIdrJUxtKigeEyE1htkYG11X2LLTZVQpgQx30Fc4qquNMt9eH3ruCvqgCSqcQfD_HPm4iqv7YnJeV-hBy9n4jfPNaJnaHbxmYX4M00H-vbaz0aPVB_w7ewWNutbN8z2juYsfl7WGowIVgtIj7A333mz0xY4VgHH1CyScF0FWBmaHIyn0ZSS1qm84ye_KsGqXr6mAKjC_esMG5a-pNF1pacLZfh_EXWegVm8yK3q8BQpQ5iGadKGSPQXzJaoOWi0FWVSttw0IOdZj2TtC51Togbo6Qr0kwkSJAECZEguenBt7bL2Nf5eO7ljYZISb3ly6Rj0B58bptxs1IERue2mNI7KAJjgV53D7Ya4j4Y4ukPbrX0___01p6f3id4jTsn-XlydroO82gACp_QuAGzk6up3UQja2I-VtzM4M9Lb597i085Pg
linkToUnpaywall http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1Lb9swDCay5LD10Me2oukLGtDTCnVxJEv2MWgbBD0UPSxAdjIkR8KGBnbQ2Fi3Xz_Ksp10w1r0aj1sg6L4fSJFApzJWDEuhKUstoZyRNxUc-Q8aF0DywJrpa2iLW7FZMpvZuGsA03Bu7_SCwTOL_aFSe6s9hvoiRABdxd609u70beKSiE-ZMOqRmsQSkaRlIvGd-kvyAnhoiwYRZ4R0cen1mcNKVsv6Ba8LbOl-vVTLRYbhma8A1fNdR0fX3J_URb6Iv39b_bG5_5hF7ZroElGfmXsQcdk72GnKeJAap3-AN9HxB9ykNySdb7_FSlyoiqPMEGMSHzcR701Enyve_KjmqQa6Z0AxN2QJ7m25cofBZI2R-zqI0zH118vJ7Quv0BTHkYFRSSjh3OGolPIArVIUUNtFKU2sprPB_NUxMIg-rJzPTTKoHYrowKDLSaVnGu2D90sz8wBELSBKLk4lVJrjgRHK45QQyK3FFIZFvZh0IglSevc5K5ExiJZZ1V2kkxQkomTZPLYh8_tkKVPzPFc5-NG1kmto6vEVX6K4mEkeB8-tc2oXc5lojKTl64P7lkxR5rch_NmjWxM8f8XnrfL6OXPO3xV7yN4h6iN-yjEY-gWD6U5QWRU6NNaM_4A7fUF7w
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=A+family+of+experiments+to+assess+the+effectiveness+and+efficiency+of+source+code+obfuscation+techniques&rft.jtitle=Empirical+software+engineering+%3A+an+international+journal&rft.au=Ceccato%2C+Mariano&rft.au=Di+Penta%2C+Massimiliano&rft.au=Falcarin%2C+Paolo&rft.au=Ricca%2C+Filippo&rft.date=2014-08-01&rft.pub=Springer+US&rft.issn=1382-3256&rft.eissn=1573-7616&rft.volume=19&rft.issue=4&rft.spage=1040&rft.epage=1074&rft_id=info:doi/10.1007%2Fs10664-013-9248-x&rft.externalDocID=10_1007_s10664_013_9248_x
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1382-3256&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1382-3256&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1382-3256&client=summon