@inproceedings{9b1ce674a324471684ad389fab7c9f7d,
title = "Code Artificiality: A Metric for the Code Stealth Based on an N-Gram Model",
abstract = "This paper proposes a method for evaluating the artificiality of protected code by means of an N-gram model. The proposed artificiality metric helps us measure the stealth of the protected code, that is, the degree to which protected code can be distinguished from unprotected code. In a case study, we use the proposed method to evaluate the artificiality of programs that are transformed by well-known obfuscation techniques. The results show that static obfuscating transformations (e.g., Control flow flattening) have little effect on artificiality. However, dynamic obfuscating transformations (e.g., Code encryption), or a technique that inserts junk code fragments into the program, tend to increase the artificiality, which may have a significant impact on the stealth of the code.",
keywords = "Code Obfuscation, Code Stealth, Program Analysis, Software Protection",
author = "Yuichiro Kanzaki and Akito Monden and Christian Collberg",
note = "Publisher Copyright: {\textcopyright} 2015 IEEE.; 1st International Workshop on Software Protection, SPRO 2015 ; Conference date: 19-05-2015",
year = "2015",
month = jul,
day = "31",
doi = "10.1109/SPRO.2015.14",
language = "English (US)",
series = "Proceedings - International Workshop on Software Protection, SPRO 2015",
publisher = "Institute of Electrical and Electronics Engineers Inc.",
pages = "31--37",
booktitle = "Proceedings - International Workshop on Software Protection, SPRO 2015",
}