A family of experiments to assess the effectiveness and efficiency of source code obfuscation techniques
Context: code obfuscation is intended to obstruct code understanding and, eventually, to delay malicious code changes and ultimately render it uneconomical. Although code understanding cannot be completely impeded, code obfuscation makes it more laborious and troublesome, so as to discourage or reta...
Saved in:
| Published in | Empirical software engineering : an international journal Vol. 19; no. 4; pp. 1040 - 1074 |
|---|---|
| Main Authors | , , , , , |
| Format | Journal Article |
| Language | English |
| Published |
Boston
Springer US
01.08.2014
Springer Nature B.V |
| Subjects | |
| Online Access | Get full text |
| ISSN | 1382-3256 1573-7616 1573-7616 |
| DOI | 10.1007/s10664-013-9248-x |
Cover
| Abstract | Context:
code obfuscation is intended to obstruct code understanding and, eventually, to delay malicious code changes and ultimately render it uneconomical. Although code understanding cannot be completely impeded, code obfuscation makes it more laborious and troublesome, so as to discourage or retard code tampering. Despite the extensive adoption of obfuscation, its assessment has been addressed indirectly either by using internal metrics or taking the point of view of code analysis, e.g., considering the associated computational complexity. To the best of our knowledge, there is no publicly available user study that measures the cost of understanding obfuscated code from the point of view of a human attacker.
Aim:
this paper experimentally assesses the impact of code obfuscation on the capability of human subjects to understand and change source code. In particular, it considers code protected with two well-known code obfuscation techniques, i.e., identifier renaming and opaque predicates.
Method:
We have conducted a family of five controlled experiments, involving undergraduate and graduate students from four Universities. During the experiments, subjects had to perform comprehension or attack tasks on decompiled clients of two Java network-based applications, either obfuscated using one of the two techniques, or not. To assess and compare the obfuscation techniques, we measured the correctness and the efficiency of the performed task.
Results:
—at least for the tasks we considered—simpler techniques (i.e., identifier renaming) prove to be more effective than more complex ones (i.e., opaque predicates) in impeding subjects to complete attack tasks. |
|---|---|
| AbstractList | Context:
code obfuscation is intended to obstruct code understanding and, eventually, to delay malicious code changes and ultimately render it uneconomical. Although code understanding cannot be completely impeded, code obfuscation makes it more laborious and troublesome, so as to discourage or retard code tampering. Despite the extensive adoption of obfuscation, its assessment has been addressed indirectly either by using internal metrics or taking the point of view of code analysis, e.g., considering the associated computational complexity. To the best of our knowledge, there is no publicly available user study that measures the cost of understanding obfuscated code from the point of view of a human attacker.
Aim:
this paper experimentally assesses the impact of code obfuscation on the capability of human subjects to understand and change source code. In particular, it considers code protected with two well-known code obfuscation techniques, i.e., identifier renaming and opaque predicates.
Method:
We have conducted a family of five controlled experiments, involving undergraduate and graduate students from four Universities. During the experiments, subjects had to perform comprehension or attack tasks on decompiled clients of two Java network-based applications, either obfuscated using one of the two techniques, or not. To assess and compare the obfuscation techniques, we measured the correctness and the efficiency of the performed task.
Results:
—at least for the tasks we considered—simpler techniques (i.e., identifier renaming) prove to be more effective than more complex ones (i.e., opaque predicates) in impeding subjects to complete attack tasks. Context: code obfuscation is intended to obstruct code understanding and, eventually, to delay malicious code changes and ultimately render it uneconomical. Although code understanding cannot be completely impeded, code obfuscation makes it more laborious and troublesome, so as to discourage or retard code tampering. Despite the extensive adoption of obfuscation, its assessment has been addressed indirectly either by using internal metrics or taking the point of view of code analysis, e.g., considering the associated computational complexity. To the best of our knowledge, there is no publicly available user study that measures the cost of understanding obfuscated code from the point of view of a human attacker. Aim: this paper experimentally assesses the impact of code obfuscation on the capability of human subjects to understand and change source code. In particular, it considers code protected with two well-known code obfuscation techniques, i.e., identifier renaming and opaque predicates. Method: We have conducted a family of five controlled experiments, involving undergraduate and graduate students from four Universities. During the experiments, subjects had to perform comprehension or attack tasks on decompiled clients of two Java network-based applications, either obfuscated using one of the two techniques, or not. To assess and compare the obfuscation techniques, we measured the correctness and the efficiency of the performed task. Results: -at least for the tasks we considered-simpler techniques (i.e., identifier renaming) prove to be more effective than more complex ones (i.e., opaque predicates) in impeding subjects to complete attack tasks. Context: code obfuscation is intended to obstruct code understanding and, eventually, to delay malicious code changes and ultimately render it uneconomical. Although code understanding cannot be completely impeded, code obfuscation makes it more laborious and troublesome, so as to discourage or retard code tampering. Despite the extensive adoption of obfuscation, its assessment has been addressed indirectly either by using internal metrics or taking the point of view of code analysis, e.g., considering the associated computational complexity. To the best of our knowledge, there is no publicly available user study that measures the cost of understanding obfuscated code from the point of view of a human attacker. Aim: this paper experimentally assesses the impact of code obfuscation on the capability of human subjects to understand and change source code. In particular, it considers code protected with two well-known code obfuscation techniques, i.e., identifier renaming and opaque predicates. Method: We have conducted a family of five controlled experiments, involving undergraduate and graduate students from four Universities. During the experiments, subjects had to perform comprehension or attack tasks on decompiled clients of two Java network-based applications, either obfuscated using one of the two techniques, or not. To assess and compare the obfuscation techniques, we measured the correctness and the efficiency of the performed task. Results: --at least for the tasks we considered--simpler techniques (i.e., identifier renaming) prove to be more effective than more complex ones (i.e., opaque predicates) in impeding subjects to complete attack tasks.[PUBLICATION ABSTRACT] |
| Author | Tonella, Paolo Ceccato, Mariano Di Penta, Massimiliano Ricca, Filippo Torchiano, Marco Falcarin, Paolo |
| Author_xml | – sequence: 1 givenname: Mariano surname: Ceccato fullname: Ceccato, Mariano email: ceccato@fbk.eu organization: Cit, Fondazione Bruno Kessler – sequence: 2 givenname: Massimiliano surname: Di Penta fullname: Di Penta, Massimiliano organization: Department of Engineering, University of Sannio – sequence: 3 givenname: Paolo surname: Falcarin fullname: Falcarin, Paolo organization: School of Architecture, Computing and Engineering, University of East London – sequence: 4 givenname: Filippo surname: Ricca fullname: Ricca, Filippo organization: DIBRIS, University of Genova – sequence: 5 givenname: Marco surname: Torchiano fullname: Torchiano, Marco organization: Politecnico di Torino – sequence: 6 givenname: Paolo surname: Tonella fullname: Tonella, Paolo organization: Cit, Fondazione Bruno Kessler |
| BookMark | eNqNkEtPxCAUhYnRxOcPcEfixk0VKKV0aYyvZBI3uiaUXhxMB8ZCdebfS51ZGBONK24u54NzziHa9cEDQqeUXFBC6stIiRC8ILQsGsZlsdpBB7Sqy6IWVOzmuZSsKFkl9tFhjK-EkKbm1QGaX2GrF65f42AxrJYwuAX4FHEKWMcIMU9zwGAtmOTewU8b7btp44wDb77IGMbBADahAxxaO0ajkwseJzBz795GiMdoz-o-wsn2PELPtzdP1_fF7PHu4fpqVhheyVTIpmxZV7acaclJK0xLiJXSWGlb3pHOiEaAoMR2LQMNpKIaNIV8A6bmvC2PENu8O_qlXn_ovlfLnEkPa0WJmrpSm65U7kpNXalVhs430HIIk9mkFi4a6HvtIYxR0aqipOE1o1l69kP6mrP7HCmrWCUbJgXPKrpRmSHEOID9l4n6B2Nc-qoxDdr1f5LbzDH_4l9g-ObpV-gTIYetWA |
| CitedBy_id | crossref_primary_10_1007_s10664_017_9563_8 crossref_primary_10_1007_s10664_014_9321_0 crossref_primary_10_1145_2629457 crossref_primary_10_1007_s10664_023_10339_2 crossref_primary_10_15622_ia_23_3_3 crossref_primary_10_1007_s10664_022_10160_3 crossref_primary_10_1145_3577198 crossref_primary_10_1145_2699696 |
| Cites_doi | 10.1016/j.infsof.2008.01.007 10.1109/TSE.2009.69 10.1145/1314257.1314263 10.1145/268946.268962 10.1007/978-1-4757-3304-4 10.1016/S0164-1212(98)10058-4 10.1109/MS.2011.34 10.1016/j.cose.2005.11.002 10.1109/TSE.2003.1183929 10.1016/j.scico.2006.04.002 10.1109/ICPC.2009.5090041 10.1007/3-540-44456-4_7 10.1007/3-540-47870-1_10 10.1007/3-540-47870-1_9 10.1109/SCAM.2007.27 10.1145/1368088.1368138 10.4135/9781412983327 10.1109/WCRE.2005.13 10.1109/ARES.2008.21 10.1109/AINA.2006.286 10.1007/978-1-4615-4625-2 |
| ContentType | Journal Article |
| Copyright | Springer Science+Business Media New York 2013 Springer Science+Business Media New York 2014 |
| Copyright_xml | – notice: Springer Science+Business Media New York 2013 – notice: Springer Science+Business Media New York 2014 |
| DBID | AAYXX CITATION 7SC 8FD 8FE 8FG ABJCF AFKRA ARAPS BENPR BGLVJ CCPQU DWQXO HCIFZ JQ2 L6V L7M L~C L~D M7S P5Z P62 PHGZM PHGZT PKEHL PQEST PQGLB PQQKQ PQUKI PRINS PTHSS S0W ADTOC UNPAY |
| DOI | 10.1007/s10664-013-9248-x |
| DatabaseName | CrossRef Computer and Information Systems Abstracts Technology Research Database ProQuest SciTech Collection ProQuest Technology Collection Materials Science & Engineering Collection ProQuest Central UK/Ireland Advanced Technologies & Computer Science Collection ProQuest Central Technology Collection (via ProQuest SciTech Premium Collection) ProQuest One ProQuest Central SciTech Premium Collection ProQuest Computer Science Collection ProQuest Engineering Collection Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Academic Computer and Information Systems Abstracts Professional Engineering Database Advanced Technologies & Aerospace Database ProQuest Advanced Technologies & Aerospace Collection ProQuest Central Premium ProQuest One Academic ProQuest One Academic Middle East (New) ProQuest One Academic Eastern Edition (DO NOT USE) ProQuest One Applied & Life Sciences ProQuest One Academic ProQuest One Academic UKI Edition ProQuest Central China Engineering Collection DELNET Engineering & Technology Collection Unpaywall for CDI: Periodical Content Unpaywall |
| DatabaseTitle | CrossRef Technology Collection Technology Research Database Computer and Information Systems Abstracts – Academic ProQuest One Academic Middle East (New) ProQuest Advanced Technologies & Aerospace Collection ProQuest Computer Science Collection Computer and Information Systems Abstracts SciTech Premium Collection ProQuest One Community College ProQuest Central China ProQuest Central ProQuest One Applied & Life Sciences ProQuest Engineering Collection ProQuest Central Korea ProQuest Central (New) Advanced Technologies Database with Aerospace Engineering Collection Advanced Technologies & Aerospace Collection Engineering Database ProQuest One Academic Eastern Edition ProQuest Technology Collection ProQuest SciTech Collection Computer and Information Systems Abstracts Professional Advanced Technologies & Aerospace Database ProQuest One Academic UKI Edition ProQuest DELNET Engineering and Technology Collection Materials Science & Engineering Collection ProQuest One Academic ProQuest One Academic (New) |
| DatabaseTitleList | Computer and Information Systems Abstracts Technology Collection |
| Database_xml | – sequence: 1 dbid: UNPAY name: Unpaywall url: https://proxy.k.utb.cz/login?url=https://unpaywall.org/ sourceTypes: Open Access Repository – sequence: 2 dbid: 8FG name: ProQuest Technology Collection url: https://search.proquest.com/technologycollection1 sourceTypes: Aggregation Database |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Computer Science |
| EISSN | 1573-7616 |
| EndPage | 1074 |
| ExternalDocumentID | oai:iris.unive.it:10278/3746441 3307848401 10_1007_s10664_013_9248_x |
| Genre | Feature |
| GroupedDBID | -4Z -59 -5G -BR -EM -Y2 -~C .86 .DC .VR 06D 0R~ 0VY 199 1N0 1SB 2.D 203 28- 29G 2J2 2JN 2JY 2KG 2LR 2P1 2VQ 2~H 30V 4.4 406 408 409 40D 40E 5GY 5QI 5VS 67Z 6NX 78A 8FE 8FG 8TC 8UJ 95- 95. 95~ 96X AABHQ AACDK AAHNG AAIAL AAJBT AAJKR AANZL AAOBN AARHV AARTL AASML AATNV AATVU AAUYE AAWCG AAYIU AAYOK AAYQN AAYTO AAYZH ABAKF ABBBX ABBXA ABDZT ABECU ABFTD ABFTV ABHLI ABHQN ABJCF ABJNI ABJOX ABKCH ABKTR ABMNI ABMQK ABNWP ABQBU ABQSL ABSXP ABTEG ABTHY ABTKH ABTMW ABULA ABWNU ABXPI ACAOD ACBXY ACDTI ACGFS ACHSB ACHXU ACIWK ACKNC ACMDZ ACMLO ACOKC ACOMO ACPIV ACSNA ACZOJ ADHHG ADHIR ADIMF ADINQ ADKNI ADKPE ADRFC ADTPH ADURQ ADYFF ADZKW AEBTG AEFIE AEFQL AEGAL AEGNC AEJHL AEJRE AEKMD AEMSY AENEX AEOHA AEPYU AESKC AETLH AEVLU AEXYK AFBBN AFEXP AFGCZ AFKRA AFLOW AFQWF AFWTZ AFZKB AGAYW AGDGC AGGDS AGJBK AGMZJ AGQEE AGQMX AGRTI AGWIL AGWZB AGYKE AHAVH AHBYD AHKAY AHSBF AHYZX AIAKS AIGIU AIIXL AILAN AITGF AJBLW AJRNO AJZVZ ALMA_UNASSIGNED_HOLDINGS ALWAN AMKLP AMXSW AMYLF AMYQR AOCGG ARAPS ARMRJ ASPBG AVWKF AXYYD AYJHY AZFZN B-. BA0 BBWZM BDATZ BENPR BGLVJ BGNMA BSONS CAG CCPQU COF CS3 CSCUP DDRTE DL5 DNIVK DPUIP DU5 EBLON EBS EIOEI EJD ESBYG FEDTE FERAY FFXSO FIGPU FINBP FNLPD FRRFC FSGXE FWDCC GGCAI GGRSB GJIRD GNWQR GQ6 GQ7 GQ8 GXS H13 HCIFZ HF~ HG5 HG6 HMJXF HQYDN HRMNR HVGLF HZ~ I09 IHE IJ- IKXTQ ITM IWAJR IXC IZIGR IZQ I~X I~Z J-C J0Z JBSCW JCJTX JZLTJ KDC KOV KOW L6V LAK LLZTM M4Y M7S MA- N2Q NB0 NDZJH NPVJJ NQJWS NU0 O9- O93 O9G O9I O9J OAM P19 P62 P9O PF0 PT4 PT5 PTHSS Q2X QOK QOS R4E R89 R9I RHV RNI RNS ROL RPX RSV RZC RZE RZK S0W S16 S1Z S26 S27 S28 S3B SAP SCJ SCLPG SCO SDH SDM SHX SISQX SJYHP SNE SNPRN SNX SOHCF SOJ SPISZ SRMVM SSLCW STPWE SZN T13 T16 TSG TSK TSV TUC U2A UG4 UOJIU UTJUX UZXMN VC2 VFIZW W23 W48 WK8 YLTOR Z45 Z7R Z7S Z7V Z7X Z7Z Z81 Z83 Z86 Z88 Z8M Z8N Z8P Z8R Z8T Z8U Z8W Z92 ZMTXR ~EX AAPKM AAYXX ABBRH ABDBE ABFSG ABRTQ ACSTC ADHKG AEZWR AFDZB AFHIU AGQPQ AHPBZ AHWEU AIXLP ATHPR AYFIA CITATION PHGZM PHGZT PQGLB PUEGO 7SC 8FD DWQXO JQ2 L7M L~C L~D PKEHL PQEST PQQKQ PQUKI PRINS ADTOC AFOHR UNPAY |
| ID | FETCH-LOGICAL-c458t-893b2d3b42a840b6cb00f88cf8fb4d0dc696e610fdb2eae051aea1ed0dec744b3 |
| IEDL.DBID | AGYKE |
| ISSN | 1382-3256 1573-7616 |
| IngestDate | Sun Oct 26 04:13:58 EDT 2025 Fri Sep 05 08:08:16 EDT 2025 Fri Jul 25 11:19:48 EDT 2025 Wed Oct 01 04:12:34 EDT 2025 Thu Apr 24 23:07:25 EDT 2025 Fri Feb 21 02:35:45 EST 2025 |
| IsDoiOpenAccess | true |
| IsOpenAccess | true |
| IsPeerReviewed | true |
| IsScholarly | true |
| Issue | 4 |
| Keywords | Software obfuscation Program comprehension Empirical studies |
| Language | English |
| License | http://www.springer.com/tdm other-oa |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-c458t-893b2d3b42a840b6cb00f88cf8fb4d0dc696e610fdb2eae051aea1ed0dec744b3 |
| Notes | SourceType-Scholarly Journals-1 ObjectType-Feature-1 content type line 14 ObjectType-Article-2 content type line 23 |
| OpenAccessLink | https://proxy.k.utb.cz/login?url=http://hdl.handle.net/10278/3746441 |
| PQID | 1525892864 |
| PQPubID | 326341 |
| PageCount | 35 |
| ParticipantIDs | unpaywall_primary_10_1007_s10664_013_9248_x proquest_miscellaneous_1551094721 proquest_journals_1525892864 crossref_primary_10_1007_s10664_013_9248_x crossref_citationtrail_10_1007_s10664_013_9248_x springer_journals_10_1007_s10664_013_9248_x |
| ProviderPackageCode | CITATION AAYXX |
| PublicationCentury | 2000 |
| PublicationDate | 2014-08-01 |
| PublicationDateYYYYMMDD | 2014-08-01 |
| PublicationDate_xml | – month: 08 year: 2014 text: 2014-08-01 day: 01 |
| PublicationDecade | 2010 |
| PublicationPlace | Boston |
| PublicationPlace_xml | – name: Boston – name: Dordrecht |
| PublicationSubtitle | An International Journal |
| PublicationTitle | Empirical software engineering : an international journal |
| PublicationTitleAbbrev | Empir Software Eng |
| PublicationYear | 2014 |
| Publisher | Springer US Springer Nature B.V |
| Publisher_xml | – name: Springer US – name: Springer Nature B.V |
| References | Oppenheim (CR23) 1992 Ricca, Di Penta, Torchiano, Tonella, Ceccato (CR25) 2010; 36 CR19 CR18 CR17 CR15 Collberg, Thomborson, Low (CR10) 1998 Sutherland, Kalb, Blyth, Mulley (CR30) 2006; 25 CR12 CR33 Anckaert, Madou, Sutter, Bus, Bosschere, Preneel (CR1) 2007 CR32 CR31 Juristo, Moreno (CR21) 2001 Falcarin, Collberg, Atallah, Jakubowski (CR14) 2011; 28 CR2 CR4 CR3 CR6 CR5 CR8 CR29 CR28 Cohen (CR7) 1988 CR9 CR26 CR24 CR22 Cordy (CR11) 2006; 61 Eisenbarth, Koschke, Simon (CR13) 2003; 29 Fiutem, Tonella, Antoniol, Merlo (CR16) 1999; 44 CR20 Ricca, Torchiano, Di Penta, Ceccato, Tonella (CR27) 2009; 51 F Ricca (9248_CR25) 2010; 36 P Falcarin (9248_CR14) 2011; 28 9248_CR31 J Cohen (9248_CR7) 1988 9248_CR8 9248_CR15 F Ricca (9248_CR27) 2009; 51 9248_CR6 9248_CR17 9248_CR5 9248_CR4 9248_CR33 9248_CR3 9248_CR32 9248_CR2 9248_CR12 I Sutherland (9248_CR30) 2006; 25 9248_CR19 9248_CR18 9248_CR9 C Collberg (9248_CR10) 1998 AN Oppenheim (9248_CR23) 1992 9248_CR20 J Cordy (9248_CR11) 2006; 61 T Eisenbarth (9248_CR13) 2003; 29 B Anckaert (9248_CR1) 2007 9248_CR26 9248_CR28 R Fiutem (9248_CR16) 1999; 44 9248_CR22 9248_CR24 N Juristo (9248_CR21) 2001 9248_CR29 |
| References_xml | – ident: CR22 – ident: CR18 – year: 1988 ident: CR7 publication-title: Statistical power analysis for the behavioral sciences – ident: CR4 – volume: 51 start-page: 270 year: 2009 end-page: 283 ident: CR27 article-title: Using acceptance tests as a support for clarifying requirements: a series of experiments publication-title: Inf Softw Technol doi: 10.1016/j.infsof.2008.01.007 – ident: CR2 – ident: CR12 – ident: CR33 – ident: CR6 – ident: CR29 – ident: CR8 – volume: 36 start-page: 96 year: 2010 end-page: 118 ident: CR25 article-title: How developers’ experience and ability influence web application comprehension tasks supported by UML stereotypes: a series of four experiments publication-title: IEEE Trans Softw Eng doi: 10.1109/TSE.2009.69 – start-page: 15 year: 2007 end-page: 20 ident: CR1 article-title: Program obfuscation: a quantitative approach publication-title: QoP ’07: Proc. of the 2007 ACM workshop on quality of protection doi: 10.1145/1314257.1314263 – ident: CR19 – start-page: 184 year: 1998 end-page: 196 ident: CR10 article-title: Manufacturing cheap, resilient, and stealthy opaque constructs publication-title: POPL ’98: Proceedings of the 25th ACM SIGPLAN-SIGACT symposium on principles of programming languages doi: 10.1145/268946.268962 – year: 2001 ident: CR21 publication-title: Basics of software engineering experimentation doi: 10.1007/978-1-4757-3304-4 – volume: 44 start-page: 213 issue: 3 year: 1999 end-page: 227 ident: CR16 article-title: Points-to analysis for program understanding publication-title: J Syst Softw doi: 10.1016/S0164-1212(98)10058-4 – ident: CR3 – volume: 28 start-page: 24 issue: 2 year: 2011 end-page: 27 ident: CR14 article-title: Guest editors’ introduction: software protection publication-title: IEEE Softw doi: 10.1109/MS.2011.34 – ident: CR15 – ident: CR17 – ident: CR31 – ident: CR9 – year: 1992 ident: CR23 publication-title: Questionnaire design, interviewing and attitude measurement – volume: 25 start-page: 221 issue: 3 year: 2006 end-page: 228 ident: CR30 article-title: An empirical examination of the reverse engineering process for binary files publication-title: Comput Secur doi: 10.1016/j.cose.2005.11.002 – ident: CR32 – ident: CR5 – volume: 29 start-page: 195 issue: 3 year: 2003 end-page: 209 ident: CR13 article-title: Locating features in source code publication-title: IEEE Trans Softw Eng doi: 10.1109/TSE.2003.1183929 – ident: CR28 – ident: CR26 – ident: CR24 – volume: 61 start-page: 190 issue: 3 year: 2006 end-page: 210 ident: CR11 article-title: The TXL source transformation language publication-title: Sci Comput Program doi: 10.1016/j.scico.2006.04.002 – ident: CR20 – ident: 9248_CR3 doi: 10.1109/ICPC.2009.5090041 – volume: 29 start-page: 195 issue: 3 year: 2003 ident: 9248_CR13 publication-title: IEEE Trans Softw Eng doi: 10.1109/TSE.2003.1183929 – volume: 36 start-page: 96 year: 2010 ident: 9248_CR25 publication-title: IEEE Trans Softw Eng doi: 10.1109/TSE.2009.69 – volume: 51 start-page: 270 year: 2009 ident: 9248_CR27 publication-title: Inf Softw Technol doi: 10.1016/j.infsof.2008.01.007 – ident: 9248_CR17 doi: 10.1007/3-540-44456-4_7 – ident: 9248_CR6 doi: 10.1007/3-540-47870-1_10 – ident: 9248_CR19 doi: 10.1007/3-540-47870-1_9 – volume-title: Basics of software engineering experimentation year: 2001 ident: 9248_CR21 doi: 10.1007/978-1-4757-3304-4 – ident: 9248_CR18 – volume: 25 start-page: 221 issue: 3 year: 2006 ident: 9248_CR30 publication-title: Comput Secur doi: 10.1016/j.cose.2005.11.002 – start-page: 184 volume-title: POPL ’98: Proceedings of the 25th ACM SIGPLAN-SIGACT symposium on principles of programming languages year: 1998 ident: 9248_CR10 doi: 10.1145/268946.268962 – ident: 9248_CR5 doi: 10.1109/SCAM.2007.27 – ident: 9248_CR2 – volume: 61 start-page: 190 issue: 3 year: 2006 ident: 9248_CR11 publication-title: Sci Comput Program doi: 10.1016/j.scico.2006.04.002 – ident: 9248_CR26 doi: 10.1145/1368088.1368138 – ident: 9248_CR8 – ident: 9248_CR20 doi: 10.4135/9781412983327 – ident: 9248_CR31 – volume-title: Questionnaire design, interviewing and attitude measurement year: 1992 ident: 9248_CR23 – ident: 9248_CR29 – ident: 9248_CR12 – start-page: 15 volume-title: QoP ’07: Proc. of the 2007 ACM workshop on quality of protection year: 2007 ident: 9248_CR1 doi: 10.1145/1314257.1314263 – ident: 9248_CR32 doi: 10.1109/WCRE.2005.13 – volume: 44 start-page: 213 issue: 3 year: 1999 ident: 9248_CR16 publication-title: J Syst Softw doi: 10.1016/S0164-1212(98)10058-4 – ident: 9248_CR22 – ident: 9248_CR28 doi: 10.1109/ARES.2008.21 – volume: 28 start-page: 24 issue: 2 year: 2011 ident: 9248_CR14 publication-title: IEEE Softw doi: 10.1109/MS.2011.34 – ident: 9248_CR15 doi: 10.1109/AINA.2006.286 – ident: 9248_CR24 – volume-title: Statistical power analysis for the behavioral sciences year: 1988 ident: 9248_CR7 – ident: 9248_CR9 – ident: 9248_CR4 doi: 10.1109/ICPC.2009.5090041 – ident: 9248_CR33 doi: 10.1007/978-1-4615-4625-2 |
| SSID | ssj0009745 |
| Score | 2.3394623 |
| Snippet | Context:
code obfuscation is intended to obstruct code understanding and, eventually, to delay malicious code changes and ultimately render it uneconomical.... Context: code obfuscation is intended to obstruct code understanding and, eventually, to delay malicious code changes and ultimately render it uneconomical.... |
| SourceID | unpaywall proquest crossref springer |
| SourceType | Open Access Repository Aggregation Database Enrichment Source Index Database Publisher |
| StartPage | 1040 |
| SubjectTerms | Assessments Compilers Computer Science Delay Graduates Human Interpreters Networks Programming Languages Software Engineering/Programming and Operating Systems Source code Students Tasks |
| SummonAdditionalLinks | – databaseName: ProQuest Central dbid: BENPR link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwhV3NS8MwFH_M7aAe_BanUyJ4cgTdmqXtQWTKxvAwRBzsVpI2QWG007U4_3tf-jkPzmvTpKEvL_m9j_wewJXtCotxrqnlakUZIm4qGdo8eLp2tNXR2tZptsWYjybsadqb1mBc3IUxaZXFnphu1EHkGx_5janT47hdh7P7-Qc1VaNMdLUooSHy0grBXUoxtgGNrmHGqkPjYTB-fqloeO20bLEh3qMWzqeIc2aX6Tg3GRkWRZvEocvfJ1UFP8uI6TZsJuFcfH-J2WzlUBruwU6OJkk_E_8-1FR4ALtFpQaSK-4hvPVJ5skgkSYVqf-CxBERadiXIBAkWXJHvv8REQbmyXs6SNoz8_QTcw2eRFIni8zfR0oi2MURTIaD18cRzWssUJ_1nJgiXJHdwEL5CDT1JPdRDbXj-NrRkgW3gc9drhBi6UB2lVCowkKJjsIW5duMSesY6mEUqhMgeND1XO76ti0lQytGCoZ4wkYDkttCWb0m3Bb_0_NzAnJTB2PmVdTJRgQeisAzIvCWTbguu8wz9o11L7cKIXm5Ii68atk04bJsRhUycRERqigx7-DG5DK0hZvQLoS7MsTfH2yX8v9_eqfrp3cGW4jFWJZb2IJ6_Jmoc8Q7sbzIF_EPtn78XQ priority: 102 providerName: ProQuest – databaseName: Unpaywall dbid: UNPAY link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1Lb9swDCay5LD10Me2oukLGtDTCnVxJEv2MWgbBD0UPSxAdjIkR8KGBnbQ2Fi3Xz_Ksp10w1r0aj1sg6L4fSJFApzJWDEuhKUstoZyRNxUc-Q8aF0DywJrpa2iLW7FZMpvZuGsA03Bu7_SCwTOL_aFSe6s9hvoiRABdxd609u70beKSiE-ZMOqRmsQSkaRlIvGd-kvyAnhoiwYRZ4R0cen1mcNKVsv6Ba8LbOl-vVTLRYbhma8A1fNdR0fX3J_URb6Iv39b_bG5_5hF7ZroElGfmXsQcdk72GnKeJAap3-AN9HxB9ykNySdb7_FSlyoiqPMEGMSHzcR701Enyve_KjmqQa6Z0AxN2QJ7m25cofBZI2R-zqI0zH118vJ7Quv0BTHkYFRSSjh3OGolPIArVIUUNtFKU2sprPB_NUxMIg-rJzPTTKoHYrowKDLSaVnGu2D90sz8wBELSBKLk4lVJrjgRHK45QQyK3FFIZFvZh0IglSevc5K5ExiJZZ1V2kkxQkomTZPLYh8_tkKVPzPFc5-NG1kmto6vEVX6K4mEkeB8-tc2oXc5lojKTl64P7lkxR5rch_NmjWxM8f8XnrfL6OXPO3xV7yN4h6iN-yjEY-gWD6U5QWRU6NNaM_4A7fUF7w priority: 102 providerName: Unpaywall |
| Title | A family of experiments to assess the effectiveness and efficiency of source code obfuscation techniques |
| URI | https://link.springer.com/article/10.1007/s10664-013-9248-x https://www.proquest.com/docview/1525892864 https://www.proquest.com/docview/1551094721 http://hdl.handle.net/10278/3746441 |
| UnpaywallVersion | submittedVersion |
| Volume | 19 |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVLSH databaseName: SpringerLink Journals customDbUrl: mediaType: online eissn: 1573-7616 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0009745 issn: 1573-7616 databaseCode: AFBBN dateStart: 19970301 isFulltext: true providerName: Library Specific Holdings – providerCode: PRVPQU databaseName: ProQuest Central customDbUrl: http://www.proquest.com/pqcentral?accountid=15518 eissn: 1573-7616 dateEnd: 20151231 omitProxy: true ssIdentifier: ssj0009745 issn: 1573-7616 databaseCode: BENPR dateStart: 19970301 isFulltext: true titleUrlDefault: https://www.proquest.com/central providerName: ProQuest – providerCode: PRVPQU databaseName: ProQuest Technology Collection customDbUrl: eissn: 1573-7616 dateEnd: 20151231 omitProxy: true ssIdentifier: ssj0009745 issn: 1573-7616 databaseCode: 8FG dateStart: 19970301 isFulltext: true titleUrlDefault: https://search.proquest.com/technologycollection1 providerName: ProQuest – providerCode: PRVAVX databaseName: SpringerLINK - Czech Republic Consortium customDbUrl: eissn: 1573-7616 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0009745 issn: 1573-7616 databaseCode: AGYKE dateStart: 19970101 isFulltext: true titleUrlDefault: http://link.springer.com providerName: Springer Nature – providerCode: PRVAVX databaseName: SpringerLink Journals (ICM) customDbUrl: eissn: 1573-7616 dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0009745 issn: 1573-7616 databaseCode: U2A dateStart: 19970101 isFulltext: true titleUrlDefault: http://www.springerlink.com/journals/ providerName: Springer Nature |
| link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV3dS8MwED90PqgPfovTOSL4pETcmqXtY5VNURgiDvSpJG2C4mjFtvjx13vp16b4gU-lzWeTXO53ucsdwL7tCotxrqnlakUZIm4qGco8yF072upobevc2mLIz0fs4rZ3W97jTipr90olme_UU5fdODcWExZFmcGhCBzncndbDZjzzu4u-xNfu3Yem9h416MWNlopM7-r5DM7mmDMWi26CPNZ9CTeXsR4PMV5BstwU_W5MDh5PMpSeRS8f3Hn-M-fWoGlEokSr1g6qzCjojVYrqI8kJLo1-HeI8UpCIk1mQQESEgaE5GrjAmCSFIYhpR7JxFRaL485JXkJQstATFX6EksdZYUZ4WkdiKbbMBo0L85PadlfAYasJ6TUoQ6shtaOLcCxUTJAyRh7TiBdrRk4XEYcJcrhGc6lF0lFJK_UKKjMEUFNmPS2oRGFEdqCwgyyZ7L3cC2pWQoAUnBEIvYKHxyWyir14Tjapr8oHRebmJojP2J22Uzkj6OpG9G0n9twkFd5Knw3PFb5lY1935JxIlvQkM5btfhrAl7dTKSn9GpiEjFmcmDm5rLUI5uwmE1xVNV_NzgYb2s_u7e9r_q3oEFhHWsMFNsQSN9ztQuQqdUtmHWGZy1S4LB50l_eHWNX0ddD99Gwyvv7gOQfRUd |
| linkProvider | Springer Nature |
| linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV1LT9wwEB5ROFAOtOUhlleNRC9FFrux10kOqAIKWgqsqgokbsFObIG0ShayK3b_HL-NceIk9FB64hrHjuOx5-F5fAC7figZF8JQFhpNOWrcVHG0eVC6dgzrGOObItqiL3rX_NdN92YGnqtcGBtWWfHEglEnWWzvyPctTk8QeoHgP4YP1KJGWe9qBaEhHbRCclCUGHOJHed6-oQmXH5w9hPp_c3zTk-ujnvUoQzQmHeDEUWBrbyE4QwlGjtKWMh6EwSxCYziSTuJRSg0KhkmUZ6WGjex1LKjsUXHPueK4bgfYI4zHqLxN3d00v_9pyn76xcwybbQH2X4_5VftUzeE8JGgDCKNlBAJ39LxkbdrT20CzA_Tody-iQHg1dC8PQzLDrtlRyW2-0LzOh0CT5VyBDEMYpluDsk5c0JyQxpQARyMsqILNzMBBVPUgaTOH5LZJrYJ_fFIEXP0rNAbNo9yZQZ5-X9IqkLz-YrcP0uq70Ks2mW6jUgKFi7oQhj31eKo9WkJEf9xUeDVfhSs24L2tV6RrEreG5xNwZRU6rZkiBCEkSWBNGkBd_rLsOy2sdbL29WRIrcwc-jZpu2YKduxiNr_TAy1dnYvoOMMORoe7dgryLuqyH-_cG9mv7_n97629P7CvO9q8uL6OKsf74BH1EP5GVc4ybMjh7Hegt1rZHadhuawO17n6EXKcE7pA |
| linkToPdf | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV1LT9wwEB5RkFo4QB8glkfrSu2lyIJNvHZyQAgBWygV6qFI3FI7sdVKq2QhuwL-Gr-OmTgPOEBPXOPYcTzjeXjG8wF8UbEOhZSOh7GzXKDFzY1Anwe1a9-FfeeUq7ItzuTxufhxMbiYgbvmLgylVTYysRLUWZHSGfk24fREcRBJse3qtIhfh8O98SUnBCmKtDZwGp5FTu3tNbpv5e7JIdL6axAMj34fHPMaYYCnYhBNOCprE2Qhzk6jo2MkwdW7KEpd5IzIdrJUxtKigeEyE1htkYG11X2LLTZVQpgQx30Fc4qquNMt9eH3ruCvqgCSqcQfD_HPm4iqv7YnJeV-hBy9n4jfPNaJnaHbxmYX4M00H-vbaz0aPVB_w7ewWNutbN8z2juYsfl7WGowIVgtIj7A333mz0xY4VgHH1CyScF0FWBmaHIyn0ZSS1qm84ye_KsGqXr6mAKjC_esMG5a-pNF1pacLZfh_EXWegVm8yK3q8BQpQ5iGadKGSPQXzJaoOWi0FWVSttw0IOdZj2TtC51Togbo6Qr0kwkSJAECZEguenBt7bL2Nf5eO7ljYZISb3ly6Rj0B58bptxs1IERue2mNI7KAJjgV53D7Ya4j4Y4ukPbrX0___01p6f3id4jTsn-XlydroO82gACp_QuAGzk6up3UQja2I-VtzM4M9Lb597i085Pg |
| linkToUnpaywall | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1Lb9swDCay5LD10Me2oukLGtDTCnVxJEv2MWgbBD0UPSxAdjIkR8KGBnbQ2Fi3Xz_Ksp10w1r0aj1sg6L4fSJFApzJWDEuhKUstoZyRNxUc-Q8aF0DywJrpa2iLW7FZMpvZuGsA03Bu7_SCwTOL_aFSe6s9hvoiRABdxd609u70beKSiE-ZMOqRmsQSkaRlIvGd-kvyAnhoiwYRZ4R0cen1mcNKVsv6Ba8LbOl-vVTLRYbhma8A1fNdR0fX3J_URb6Iv39b_bG5_5hF7ZroElGfmXsQcdk72GnKeJAap3-AN9HxB9ykNySdb7_FSlyoiqPMEGMSHzcR701Enyve_KjmqQa6Z0AxN2QJ7m25cofBZI2R-zqI0zH118vJ7Quv0BTHkYFRSSjh3OGolPIArVIUUNtFKU2sprPB_NUxMIg-rJzPTTKoHYrowKDLSaVnGu2D90sz8wBELSBKLk4lVJrjgRHK45QQyK3FFIZFvZh0IglSevc5K5ExiJZZ1V2kkxQkomTZPLYh8_tkKVPzPFc5-NG1kmto6vEVX6K4mEkeB8-tc2oXc5lojKTl64P7lkxR5rch_NmjWxM8f8XnrfL6OXPO3xV7yN4h6iN-yjEY-gWD6U5QWRU6NNaM_4A7fUF7w |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=A+family+of+experiments+to+assess+the+effectiveness+and+efficiency+of+source+code+obfuscation+techniques&rft.jtitle=Empirical+software+engineering+%3A+an+international+journal&rft.au=Ceccato%2C+Mariano&rft.au=Di+Penta%2C+Massimiliano&rft.au=Falcarin%2C+Paolo&rft.au=Ricca%2C+Filippo&rft.date=2014-08-01&rft.pub=Springer+US&rft.issn=1382-3256&rft.eissn=1573-7616&rft.volume=19&rft.issue=4&rft.spage=1040&rft.epage=1074&rft_id=info:doi/10.1007%2Fs10664-013-9248-x&rft.externalDocID=10_1007_s10664_013_9248_x |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1382-3256&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1382-3256&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1382-3256&client=summon |