Evaluation of tamper-resistant software deviating from structured programming rules

Hideaki Goto, Masahiro Mambo, Hiroki Shizuya, Yasuyoshi Watanabe

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

7 Citations (Scopus)


Recently the demand to make software resistant to manipulation is increasing. Similarly the demand to hide operation of software or to hide secret used in software is increasing. Software possessing such properties is called tamper-resistant software. One of methods to realize tamper-resistant software is obfuscation of software, and evaluating such software objectively and quantitatively has been an important research subject. One of the known objective and quantitative methods is the method using a parse tree of a compiler proposed in [GMMS00]. This method takes into account the complexity in one module of software but not the complexity originated from relationships among modules. We propose at first several obfuscation methods to create a complicated module structure which violates the structured programming rules. Then, we propose a new evaluation method which can measure the difficulty caused by complicated structure among modules. Its effectiveness is proven through experiments. One of experiments shows the grades obtained by the proposed evaluation well reflects the actual reading time required by analysts.

Original languageEnglish
Title of host publicationInformation Security and Privacy - 6th Australasian Conference, ACISP 2001 Sydney, Australia, July 11-13, 2001 Proceedings
EditorsVijay Varadharajan, Yi Mu
PublisherSpringer Verlag
Number of pages14
ISBN (Print)3540423001
Publication statusPublished - 2001
Event6th Australasian Conference on Information Security and Privacy, ACISP 2001 - Sydney, Australia
Duration: 2001 Jul 112001 Jul 13

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349


Conference6th Australasian Conference on Information Security and Privacy, ACISP 2001


Dive into the research topics of 'Evaluation of tamper-resistant software deviating from structured programming rules'. Together they form a unique fingerprint.

Cite this