Abstract
The complexity metrics of the software code applicable for the analysis of binary files, as well as the methods used at overlaying the obfuscating transformations of these files are considered in the article. The results of the research of the metrics dependence on the performed by special software products obfuscating transformations of a vulnerable binary file are presented. The research confirms the applicability of the technique of the automated vulnerabilities search in binary files, whose analysis is difficult due to obfuscating transformations overlay.
Export citation and abstract BibTeX RIS
Content from this work may be used under the terms of the Creative Commons Attribution 3.0 licence. Any further distribution of this work must maintain attribution to the author(s) and the title of the work, journal citation and DOI.