Please use this identifier to cite or link to this item:
http://hdl.handle.net/10603/245593
Title: | Intensification of Software Security using Secure Obfuscation with Injecting and Detecting Code Clones |
Researcher: | Gautam, Pratiksha |
Guide(s): | Saini, Hemraj |
Keywords: | CFG Code Clone Engineering and Technology,Computer Science,Computer Science Cybernetics Obfuscation RFG |
University: | Jaypee University of Information Technology, Solan |
Completed Date: | 2019 |
Abstract: | Software security plays a vital role in Information Technology as it s infringe lead to tremendous monetary depletions due to the resale of application thus; it is a potential research issue in the present scenario. It can be classified as coding errors and copyright protection of software. There are three types of copyright protection attacks as software piracy, reverse engineering, and tampering. The security approaches against these assaults are software watermarking, code obfuscation and tamper-proofing. The code obfuscation is one of the pioneer methods of software protection against reverse engineering; obfuscate a code into a form which is thornier for an attacker to comprehend or modify the original code from the illegal reverse engineering procedure. The code transformation assaults can be categorized as 1) static analysis, 2) dynamic analysis, and 3), code clone attack. The reverse engineering attacks occur due to the unconfined software code to the user. Malicious reverse engineering of software codes can be compact by the travail of code obfuscation on source code. None of the existing code transformation technique protects from reverse engineering assaults. A novel code transformation method is needed for software security. Therefore, to avert static analysis assault and dynamic analysis attack on obfuscation and to make code compact for an adversary. Farther, the code clone (non-trivial software clone) is used to thwart static and dynamic analysis attacks on obfuscation. The code clone detection is another emerging research issue in software clone detection area because of it is considered adverse in software evolution and maintenance. Though various software clone detection tools and techniques have been proposed in the literature, however, in spite vigorous study there is conspicuous inadequacy of exertion in the identification and study of type-1 to type-4 software clones. Although, software clones can be classified by their features as textually equivalent software clone or functionally identica |
Pagination: | xvii, 127p. |
URI: | http://hdl.handle.net/10603/245593 |
Appears in Departments: | Department of Computer Science Engineering |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
01_title.pdf | Attached File | 25.36 kB | Adobe PDF | View/Open |
02_certificate; declaration;acknowledgement;.pdf | 783.65 kB | Adobe PDF | View/Open | |
03_table of contents; list of tables & figures; abbr.; abstract.pdf | 365.38 kB | Adobe PDF | View/Open | |
04_chapter 1.pdf | 269.8 kB | Adobe PDF | View/Open | |
05_chapter 2.pdf | 769.42 kB | Adobe PDF | View/Open | |
06_chapter 3.pdf | 378.54 kB | Adobe PDF | View/Open | |
07_chapter 4.pdf | 477.31 kB | Adobe PDF | View/Open | |
08_chapter 5.pdf | 1.18 MB | Adobe PDF | View/Open | |
09_chapter 6.pdf | 1.05 MB | Adobe PDF | View/Open | |
10_chapter 7.pdf | 2.13 MB | Adobe PDF | View/Open | |
11_chapter 8.pdf | 85.14 kB | Adobe PDF | View/Open | |
12_ references.pdf | 118.94 kB | Adobe PDF | View/Open | |
13_list of publications.pdf | 172.35 kB | Adobe PDF | View/Open |
Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).
Altmetric Badge: