This site uses cookies. By continuing to use this site you agree to our use of cookies. To find out more, see our Privacy and Cookies policy.
Paper The following article is Open access

Analysis of complexity metrics of a software code for obfuscating transformations of an executable code

and

Published under licence by IOP Publishing Ltd
, , Citation M A Kuznetsov and V O Surkov 2016 IOP Conf. Ser.: Mater. Sci. Eng. 155 012008 DOI 10.1088/1757-899X/155/1/012008

1757-899X/155/1/012008

Abstract

The complexity metrics of the software code applicable for the analysis of binary files, as well as the methods used at overlaying the obfuscating transformations of these files are considered in the article. The results of the research of the metrics dependence on the performed by special software products obfuscating transformations of a vulnerable binary file are presented. The research confirms the applicability of the technique of the automated vulnerabilities search in binary files, whose analysis is difficult due to obfuscating transformations overlay.

Export citation and abstract BibTeX RIS

Content from this work may be used under the terms of the Creative Commons Attribution 3.0 licence. Any further distribution of this work must maintain attribution to the author(s) and the title of the work, journal citation and DOI.

Please wait… references are loading.
10.1088/1757-899X/155/1/012008