Two-Level Software Obfuscation with Cooperative Co-Evolutionary Algorithms
Created by W.Langdon from
gp-bibliography.bib Revision:1.7975
- @InProceedings{aragon-jurado:2024:CEC,
-
author = "Jose Miguel Aragon-Jurado and Javier Jareno and
Juan Carlos {de la Torre} and Patricia Ruiz and
Bernabe Dorronsoro",
-
title = "Two-Level Software Obfuscation with Cooperative
Co-Evolutionary Algorithms",
-
booktitle = "2024 IEEE Congress on Evolutionary Computation (CEC)",
-
year = "2024",
-
editor = "Bing Xue",
-
address = "Yokohama, Japan",
-
month = "30 " # jun # " - 5 " # jul,
-
publisher = "IEEE",
-
keywords = "genetic algorithms, genetic programming, Measurement,
Source coding, Plagiarism, Software algorithms,
Evolutionary computation, Software, Security, Source
code obfuscation, LLVM, Intermediate Representation,
IR, Tigress, Cooperative coevolution",
-
isbn13 = "979-8-3503-0837-2",
-
DOI = "doi:10.1109/CEC60901.2024.10612116",
-
size = "8 pages",
-
abstract = "Computing devices are ubiquitous nowadays and because
of the rise of new paradigms as the Internet of Things,
their presence is continuously growing. Software (SW)
is highly exposed, and SW companies are forced to
protect their products from attacks to prevent
plagiarism and the detection of security flaws.
Obfuscation is a widespread technique to protect SW. It
consists in making the code unintelligible, so that it
is very hard to learn how it works. There are numerous
obfuscation techniques, but they often require expert
hands. Therefore, there is a clear need for fully
automatic obfuscation tools that can offer high quality
outputs independently of the specific features of the
considered SW. we define a novel combinatorial
optimisation problem for a two-level obfuscation method
that makes use of typical obfuscation transformations,
those provided by Tigress framework, as well as
classical optimisation ones, those from LLVM
compilation framework. The problem is solved with a
cooperative co-evolutionary cellular genetic algorithm,
providing a tool for automatic SW obfuscation. Three
different obfuscation metrics are considered as fitness
function. The results show that the proposed
methodology offers outstanding obfuscation results,
outperforming the original programs by up to
6,152,547percent. Moreover, compared to approaches from
the literature, these results are as much as 405 times
better.",
-
notes = "also known as \cite{10612116}
WCCI 2024",
- }
Genetic Programming entries for
Jose Miguel Aragon-Jurado
Javier Jareno Dorado
Juan Carlos de la Torre Macias
Gracia Patricia Ruiz Villalobos
Bernabe Dorronsoro
Citations