Evaluation of Software Obfuscation Based on the Randomness of Instructions.

Ami Futamura, Akito Monden, Haruaki Tamada, Yuichiro Kanzaki, Masahide Nakamura, Kenichi Matsumoto

Research output: Contribution to journalArticle

1 Citation (Scopus)

Abstract

This paper quantifies the difficulty of program analysis based on the information theory. The basic idea is to consider that a program is ultimately obfuscated if instructions appear at random; that is, (1) all instructions has an equal frequency of appearance, and (2) there is no pattern observed in the instruction sequence. We quantified (1) based on the entropy and (2) based on the Kolmogorov complexity. We evaluated the feasibility of our proposal through a case study.

Original languageEnglish
Pages (from-to)18-24
Number of pages7
JournalComputer Software
Volume30
Issue number3
DOIs
Publication statusPublished - 2013
Externally publishedYes

Fingerprint

Information theory
Entropy

ASJC Scopus subject areas

  • Software

Cite this

Evaluation of Software Obfuscation Based on the Randomness of Instructions. / Futamura, Ami; Monden, Akito; Tamada, Haruaki; Kanzaki, Yuichiro; Nakamura, Masahide; Matsumoto, Kenichi.

In: Computer Software, Vol. 30, No. 3, 2013, p. 18-24.

Research output: Contribution to journalArticle

Futamura, A, Monden, A, Tamada, H, Kanzaki, Y, Nakamura, M & Matsumoto, K 2013, 'Evaluation of Software Obfuscation Based on the Randomness of Instructions.', Computer Software, vol. 30, no. 3, pp. 18-24. https://doi.org/10.11309/jssst.30.3_18
Futamura, Ami ; Monden, Akito ; Tamada, Haruaki ; Kanzaki, Yuichiro ; Nakamura, Masahide ; Matsumoto, Kenichi. / Evaluation of Software Obfuscation Based on the Randomness of Instructions. In: Computer Software. 2013 ; Vol. 30, No. 3. pp. 18-24.
@article{95ef5e6ad3dd464f89057dceec8909e6,
title = "Evaluation of Software Obfuscation Based on the Randomness of Instructions.",
abstract = "This paper quantifies the difficulty of program analysis based on the information theory. The basic idea is to consider that a program is ultimately obfuscated if instructions appear at random; that is, (1) all instructions has an equal frequency of appearance, and (2) there is no pattern observed in the instruction sequence. We quantified (1) based on the entropy and (2) based on the Kolmogorov complexity. We evaluated the feasibility of our proposal through a case study.",
author = "Ami Futamura and Akito Monden and Haruaki Tamada and Yuichiro Kanzaki and Masahide Nakamura and Kenichi Matsumoto",
year = "2013",
doi = "10.11309/jssst.30.3_18",
language = "English",
volume = "30",
pages = "18--24",
journal = "Computer Software",
issn = "0289-6540",
publisher = "Japan Society for Software Science and Technology",
number = "3",

}

TY - JOUR

T1 - Evaluation of Software Obfuscation Based on the Randomness of Instructions.

AU - Futamura, Ami

AU - Monden, Akito

AU - Tamada, Haruaki

AU - Kanzaki, Yuichiro

AU - Nakamura, Masahide

AU - Matsumoto, Kenichi

PY - 2013

Y1 - 2013

N2 - This paper quantifies the difficulty of program analysis based on the information theory. The basic idea is to consider that a program is ultimately obfuscated if instructions appear at random; that is, (1) all instructions has an equal frequency of appearance, and (2) there is no pattern observed in the instruction sequence. We quantified (1) based on the entropy and (2) based on the Kolmogorov complexity. We evaluated the feasibility of our proposal through a case study.

AB - This paper quantifies the difficulty of program analysis based on the information theory. The basic idea is to consider that a program is ultimately obfuscated if instructions appear at random; that is, (1) all instructions has an equal frequency of appearance, and (2) there is no pattern observed in the instruction sequence. We quantified (1) based on the entropy and (2) based on the Kolmogorov complexity. We evaluated the feasibility of our proposal through a case study.

UR - http://www.scopus.com/inward/record.url?scp=85020871929&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=85020871929&partnerID=8YFLogxK

U2 - 10.11309/jssst.30.3_18

DO - 10.11309/jssst.30.3_18

M3 - Article

VL - 30

SP - 18

EP - 24

JO - Computer Software

JF - Computer Software

SN - 0289-6540

IS - 3

ER -