Validación de un modelo de protección basado en la ofuscación del código

Authors

  • Miguel Rodriguez Veliz
  • Anaisa Hernández González Facultad de Ingeniería Informática, Universidad Tecnológica de la Habana “José Antonio Echeverría” La Habana, Cuba
  • Roberto Sepúlveda Lima Facultad de Ingeniería Informática, Universidad Tecnológica de la Habana “José Antonio Echeverría” La Habana, Cuba
  • Yulier Núñez Musa Investigador independiente

Abstract

Code obfuscation is one of the techniques used for privacy against reverse engineering attacks on the source code. This research presents a model to obfuscate the call graph as a source code protection technique and its validation through the performance of white-box and black-box tests and the evaluation of the obscurity performance and the cost of the model in static reverse engineering attacks. Based on the measures that are usually used to quantify the quality of obfuscation techniques and the most common obfuscation quality attributes, the use of the degree of diversification and obfuscation achieved by the call graph of the obfuscated program ϑ(P), with respect to the original program P in the model proposed by this work is based.

Published

2025-01-16

How to Cite

Miguel Rodriguez Veliz, Hernández González, A., Sepúlveda Lima, R., & Núñez Musa, Y. (2025). Validación de un modelo de protección basado en la ofuscación del código. Industrial Engineering (Ingeniería Industrial), 45(2), 1–18. Retrieved from https://rii.cujae.edu.cu/index.php/revistaind/article/view/1292

Issue

Section

Business Informatics

Most read articles by the same author(s)