Please use this identifier to cite or link to this item: http://hdl.handle.net/10603/245593
Title: Intensification of Software Security using Secure Obfuscation with Injecting and Detecting Code Clones
Researcher: Gautam, Pratiksha
Guide(s): Saini, Hemraj
Keywords: CFG
Code Clone
Engineering and Technology,Computer Science,Computer Science Cybernetics
Obfuscation
RFG
University: Jaypee University of Information Technology, Solan
Completed Date: 2019
Abstract: Software security plays a vital role in Information Technology as it s infringe lead to tremendous monetary depletions due to the resale of application thus; it is a potential research issue in the present scenario. It can be classified as coding errors and copyright protection of software. There are three types of copyright protection attacks as software piracy, reverse engineering, and tampering. The security approaches against these assaults are software watermarking, code obfuscation and tamper-proofing. The code obfuscation is one of the pioneer methods of software protection against reverse engineering; obfuscate a code into a form which is thornier for an attacker to comprehend or modify the original code from the illegal reverse engineering procedure. The code transformation assaults can be categorized as 1) static analysis, 2) dynamic analysis, and 3), code clone attack. The reverse engineering attacks occur due to the unconfined software code to the user. Malicious reverse engineering of software codes can be compact by the travail of code obfuscation on source code. None of the existing code transformation technique protects from reverse engineering assaults. A novel code transformation method is needed for software security. Therefore, to avert static analysis assault and dynamic analysis attack on obfuscation and to make code compact for an adversary. Farther, the code clone (non-trivial software clone) is used to thwart static and dynamic analysis attacks on obfuscation. The code clone detection is another emerging research issue in software clone detection area because of it is considered adverse in software evolution and maintenance. Though various software clone detection tools and techniques have been proposed in the literature, however, in spite vigorous study there is conspicuous inadequacy of exertion in the identification and study of type-1 to type-4 software clones. Although, software clones can be classified by their features as textually equivalent software clone or functionally identica
Pagination: xvii, 127p.
URI: http://hdl.handle.net/10603/245593
Appears in Departments:Department of Computer Science Engineering

Files in This Item:
File Description SizeFormat 
01_title.pdfAttached File25.36 kBAdobe PDFView/Open
02_certificate; declaration;acknowledgement;.pdf783.65 kBAdobe PDFView/Open
03_table of contents; list of tables & figures; abbr.; abstract.pdf365.38 kBAdobe PDFView/Open
04_chapter 1.pdf269.8 kBAdobe PDFView/Open
05_chapter 2.pdf769.42 kBAdobe PDFView/Open
06_chapter 3.pdf378.54 kBAdobe PDFView/Open
07_chapter 4.pdf477.31 kBAdobe PDFView/Open
08_chapter 5.pdf1.18 MBAdobe PDFView/Open
09_chapter 6.pdf1.05 MBAdobe PDFView/Open
10_chapter 7.pdf2.13 MBAdobe PDFView/Open
11_chapter 8.pdf85.14 kBAdobe PDFView/Open
12_ references.pdf118.94 kBAdobe PDFView/Open
13_list of publications.pdf172.35 kBAdobe PDFView/Open
Show full item record


Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).

Altmetric Badge: