A survey on aims and environments of diversification and obfuscation in software security

S Hosseinzadeh, S Rauti, S Laurén… - Proceedings of the 17th …, 2016 - dl.acm.org
Proceedings of the 17th International Conference on Computer Systems and …, 2016dl.acm.org
Diversification and obfuscation methods are promising approaches used to secure software
and prevent malware from functioning. Diversification makes each software instance unique
so that malware attacks cannot rely on the knowledge of the program's execution
environment and/or internal structure anymore. We present a systematic literature review on
the state of-the-art of diversification and obfuscation research aiming to improve software
security between 1993 and 2014. As the result of systematic search, in the final phase, 209 …
Diversification and obfuscation methods are promising approaches used to secure software and prevent malware from functioning. Diversification makes each software instance unique so that malware attacks cannot rely on the knowledge of the program's execution environment and/or internal structure anymore. We present a systematic literature review on the state of-the-art of diversification and obfuscation research aiming to improve software security between 1993 and 2014. As the result of systematic search, in the final phase, 209 related papers were included in this study. In this study we focus on two specific research questions: what are the aims of diversification and obfuscation techniques and what are the environments they are applied to. The former question includes the languages and the execution environments that can benefit from these two techniques, while the second question presents the goals of the techniques and also the type of attacks they mitigate.
ACM Digital Library
以上显示的是最相近的搜索结果。 查看全部搜索结果