The Art of Obfuscation: A Comprehensive Survey of Software Protection Techniques
Software obfuscation is a key cybersecurity strategy aimed at protecting applications from reverse engineering, intellectual property theft, and unauthorized modifications. Its primary goal is to hide critical code logic and sensitive data, making it harder for attackers to identify vulnerabilities....
Saved in:
| Published in | 2025 1st International Conference on Secure IoT, Assured and Trusted Computing (SATC) pp. 1 - 6 |
|---|---|
| Main Authors | , , , |
| Format | Conference Proceeding |
| Language | English |
| Published |
IEEE
25.02.2025
|
| Subjects | |
| Online Access | Get full text |
| DOI | 10.1109/SATC65530.2025.11137197 |
Cover
| Summary: | Software obfuscation is a key cybersecurity strategy aimed at protecting applications from reverse engineering, intellectual property theft, and unauthorized modifications. Its primary goal is to hide critical code logic and sensitive data, making it harder for attackers to identify vulnerabilities. The techniques are broadly categorized into Control Flow Obfuscation, which complicates program logic to confuse attackers, and Data Obfuscation, which disguises critical information through variable manipulation, encoding, and unpredictable data structures. Additionally, layout obfuscation modifies the code's structure by renaming variables, removing comments, and rearranging formatting to hinder reverse engineering tools while preserving functionality. Preventive Transformation takes a proactive approach, introducing randomized instruction patterns and structural barriers to make static analysis and debugging less effective. Together, these techniques create a multi-layered defense, increasing software resilience against sophisticated attacks. As cyber threats evolve, continuous research and innovation in obfuscation techniques are crucial to maintaining robust security in modern software systems. |
|---|---|
| DOI: | 10.1109/SATC65530.2025.11137197 |