Hardware and Software Methods for Secure Obfuscation and Deobfuscation: An In-Depth Analysis
Abstract
1. Introduction
2. Methodology for Literature Selection and Analysis
3. Software Obfuscation
- Control Obfuscation: This indicates the obscuring of the control flow of the software. This obfuscation method type is primarily dynamic, depending on self-modulating code.
- Data Obfuscation: It prohibits the extraction of information from data. Data obfuscation methods are variable splitting, array splitting, modifying the range and lifetime of data, etc.
- Layout Obfuscation: It indicates obscuring the software’s layout by, for example, removing comments, variables renaming, modifying the style of the source code, and eliminating debugging information by covering the linguistic structure of the software.
- Preventive Transformation: Based on debuggers’ or disassemblers’ vulnerabilities, this method alters the software such that the code itself will impose the debugger or disassembler to failure.
3.1. Control Flow Obfuscation
3.2. Data Obfuscation
3.3. Software Layout Obfuscation
3.4. Preventive Transformation
3.5. Summary and Challenges
4. Hardware Obfuscation
- DSP Core Hardware Obfuscation:This type of obfuscation involves a high-level transformation of the data flow graph representation of a Digital Signal Processing (DSP) core into an obscure format, making the structure unclear at the register transfer level (RTL) or gate level. This technique is known as “Structural Obfuscation”. Another variant of this approach is called “Functional Obfuscation”. Functional obfuscation employs key bits, often using AES and IP core locking blocks (ILBs), to prevent the DSP core from functioning unless the correct key sequence is provided. If the incorrect key is used, the DSP core will either produce incorrect results or not function at all [61].
4.1. DSP Core Hardware Obfuscation
4.2. Combinational/Sequential Hardware Obfuscation
4.3. Summary and Challenges
5. Hybrid Obfuscation
5.1. Software–Software Obfuscation
5.2. Hardware–Hardware Obfuscation
5.3. Software–Hardware Obfuscation
5.4. Summary and Challenges
6. Deobfuscation
6.1. Deobfuscation Technique Comparison
6.2. Summary and Challenges
7. Obfuscation Detection
7.1. Obfuscation Detection Technique Comparison
7.2. Summary and Challenges
8. Summary and Analysis Discussion
8.1. Key Analysis Points
- Obfuscation Effectiveness vs. Performance Tradeoffs: Across all categories—software, hardware, and hybrid—there is a recurring theme: stronger obfuscation generally leads to reduced efficiency. Techniques like control flow flattening, logic locking, and encrypted management tables offer increased protection but often at the cost of runtime speed, memory usage, and energy consumption. This tradeoff remains a core challenge, especially for real-time systems and embedded platforms.
- Dynamic vs. Static Obfuscation Approaches: While static obfuscation continues to be the foundation in commercial tools, dynamic approaches—such as those using runtime control flow reconstruction (e.g., CSE with MT)—demonstrate higher resilience against static analysis and reverse engineering. However, they require careful engineering to ensure compatibility and runtime integrity.
- Interoperability and Integration Gaps: Hybrid obfuscation presents promising security benefits by linking software and hardware protections, but in practice, many systems are developed in silos. Cross-layer coordination remains underdeveloped. Effective integration will require toolchains and co-design frameworks capable of generating and managing unified obfuscation policies.
- Vulnerability of Traditional Techniques: Many traditional techniques, especially those in tools like OLLVM, have been extensively studied and partially defeated by modern analysis methods. Their use alone is no longer sufficient, and they must be supplemented with more unpredictable or adaptive techniques such as probabilistic logic, dynamic relocation, or AI-assisted transformations.
- Emergence of Machine Learning in Both Attack and Defense: Deep learning models are increasingly capable of identifying patterns even in highly obfuscated code or hardware. This presents a significant challenge to current obfuscation techniques but also an opportunity—using adversarial training and reinforcement learning to generate more resilient obfuscation strategies.
- Ethical Ambiguity and Legal Frameworks: As obfuscation is also used by malicious actors (e.g., in malware or software piracy), the ethical and legal boundaries surrounding its use are still evolving. Research into auditability, compliance, and the creation of secure but transparent obfuscation mechanisms will be critical.
- Opportunities in Post-Quantum Obfuscation: With quantum computing threatening traditional cryptographic assumptions, there is an emerging research opportunity to design obfuscation methods that remain secure in post-quantum environments. Techniques leveraging lattice-based encryption or quantum-safe logic primitives are still in early stages and warrant deeper exploration.
- Data-Driven and Domain-Specific Obfuscation: Obfuscation tailored to specific data types or application domains (e.g., medical imaging, location privacy, and industrial control systems) can provide more effective protection than general-purpose methods. VAE-based image obfuscation and LPMT for trajectory protection are early examples of this specialization.
8.2. Discussion
9. Conclusions and Future Works
Author Contributions
Funding
Data Availability Statement
Conflicts of Interest
Appendix A
Ref. | Proposed Technique | Obfuscation Processes | Evaluation Methodology | Benefits of Current Research | Cons of Current Research | Usability Within the Market | Future Opportunities and Directions |
---|---|---|---|---|---|---|---|
Category: Control Flow Obfuscation | |||||||
Li et al. [31] (2022) | Code protection method based on obscure semantics (COOPS) | It depends on the obscure semantics, where functions are considered as basic semantic units. | Tested on OpenSSL and SpecInt-2000 test sets. | 1. By comparing with O-LLVM, it shows robust impedance to Asm2vec and other program similarity analysis methods. 2. It enhances the degree of software preservation instead of necessitating time-consuming and heavyweight problems. | Performance degradation of obfuscated code. | Applied on source codes written in C/C++. | This approach only performs inlining and outlining conversion, and the obfuscation method is comparatively simple and needs to be improved by maximizing the variation of its obfuscation approaches. |
Zi-Han et al. [32] (2022) | A deep control flow obfuscation model based on callback function | It applies deep control flow: as for the loop structure, the the callback function is used to build an equal loop method, and the basic block in the software operation is transformed into an interprocess function calling to resist reverse technology. | Verified on OpenSSL and SPECint-2000 benchmark suite test set. | It provides improved protection against reverse engineering by utilizing a function calling fusion algorithm. | Performance degradation of obfuscated code. | Applied to source codes against reverse engineering | N/A |
Lu [26] (2020) | CPS-based control flow obfuscation for FJ with exception handling | It depends on a source-to-source transformation by utilizing a continuation passing style (CPS). | Tested by empirical analysis. | 1. CPS conversion leads malicious attacks to lose accuracy. 2. Efficient against attacks that utilize static control flow analysis. | Performance degradation of obfuscated code. | Applied on Java source codes against reverse engineering. | This research work is an extension of Lu’s work [148] and is inspired by Kelsey’s work [147]. It is in the process of implementation. |
Li et al. [27] (2022) | IOLLVM (Enhanced version of OLLVM) | It improves OLLVM obfuscation at the control flow and identifier levels. | Verified by experimental analysis. | 1. It can replace 65.2% of custom identifiers while ensuring software functionality. 2. The time overhead from obfuscation is nearly negligible. 3. Space overhead is at 1.5 times. | 1. Its efficiency in huge projects remains to be tested. 2. Performance degradation of obfuscated code. | Applied to source codes against scripting attacks. | This work can be enhanced by creating more secure opaque predicates that are not restricted to the number-theoretic model. |
Category: Data Obfuscation | |||||||
Gao et al. [35] (2022) | Location privacy-preserving mechanism based on trajectory obfuscation (LPMT) | It extracts the stay points of a trajectory depending on the sliding window technique and then obscures every stay point to a goal obfuscation subregion using the exponential technique. | Tested by comparing with baseline mechanisms. | It minimizes data quality loss by more than 20% while supplying the same degree of obfuscation quality, which means that LPMT has the features of robust protection and high Quality of Service. | 1. Increased computational overhead due to the need for exponential techniques to obfuscate trajectories effectively. 2. Degraded data utility due to adding noise into the obfuscated trajectories. | Applied in mobile applications that depend on location data while aiming to preserve users’ privacy. | LPMT is proper for near real-time and non-real-time MCS scenarios. Future improvements to this research may include researching the location secrecy preservation in real-time MCS scenarios. |
Popescu et al. [36] (2022) | Obfuscation algorithm for privacy-preserving deep-learning-based medical image analysis | It joins a variational autoencoder (VAE) with random non-bijective pixel intensity mapping to preserve medical image content that is thereafter utilized in building DL-based solutions. | Tested using binary classifier to test the advantage of obfuscated images in the context of model training. | It authorizes DL model training on obfuscated images with no important computational overhead while guaranteeing preservation against human eye conception and AI-based rebuilding attacks. | Degradation in precision is noted when the model is trained on obfuscated images. | Utilized for obfuscating sensitive data like medical images. | Improvements to this research may involve employing distinct datasets and DL solutions to accomplish a precise separation of the confidentiality and accuracy levels according to the obfuscation method specifications. |
Jiang et al. [37] (2022) | PriMask (Cascadable and Collusion-Resilient Data Masking for Mobile Cloud Inference) | It permits the mobile device to utilize a secret small-scale neural network named MaskNet to mask the data before submission. | Tested by implementing to three mobile sensing jobs of human activity. | It achieves good generalizability and Performance in protecting privacy while preserving the cloud inference precision. | It does not regard the problem of protecting the privacy contained in the training data utilized by the ISP to pretrain the InferNet. | Applied for mobile devices to utilize the cloud inference services. | This research considers a PSP trusted by the ISP and therefore does not consider preserving the secrecy contained in the ISP’s training data versus a curious PSP. Improving PriMask to handle a PSP that is not trusted by ISP is an important point for future research. |
Saleem et al. [38] (2022) | DP-Shield (Face Obfuscation with Differential Privacy) | It is based on two obfuscation techniques, called DP-Pix and DP-SVD, and also involves two substitutional techniques for comparison. | Tested by performing experimental analysis. | It is efficient at prohibiting facial-recognition-based attacks. | Reduction in precision of face analysis tasks like face recognition or emotion detection. | Applied to social media platforms or online services that depend on face analysis like photo. | Future opportunities for this research may involve open sourcing the DP image obfuscation techniques, releasing the face reidentification attacks as a standard test group, and enhancing the utilization of DP-Shield for mobile implementations. |
Hu et al. [39] (2020) | A model and an empirical study for obfuscating sentences | It depends on the properties of natural language where a given text is obfuscated by utilizing a neural model that aims to protect the syntactic connections of the genuine sentence so that the obscured sentence can be parsed instead of the genuine one. | Evaluated on two parsers, which are the biaffine dependency parser and the constituency parser. | 1. It excels in parsing precision against a robust random baseline when several of the words in the sentence are obscured. 2. It tends to exchange words in the genuine sentence with words which have a closer syntactic function to the genuine word than a random baseline. | 1. Reduction in parsing accuracy 2. The parsed result may become less informative or less beneficial. | Applied for obfuscating natural language input like sentences. | N/A |
Kaur et al. [48] (2022) | An encryfuscation model for preserving data and location privacy in fog-based IoT scenarios | It employs obfuscation and encryption methods. It is based on implementing a data obfuscation technique for obscuring the sensed data and a location obfuscation technique for obscuring location information. | Verified by experimental analysis. | 1. It is implemented over the data at the Secure Service Offloader (SSO) layer itself, so there is no demand to trust the fog or cloud. 2. It is hard for the attacker to reverse engineer the obscure information because of using obfuscation technique. | It utilizes just one factor like severity for making the offloading decision. Other factors like the kind of IoT service and anticipated completion time should be considered. | Applied to cloud–fog–IoT scenario. | This research can be improved by developing a convenient encryption technique for the model. |
Category: Layout Obfuscation | |||||||
Marcelli et al. [51] (2018) | Defeating Hardware Trojan in microprocessor cores through software obfuscation | It depends on a pure-software obfuscation technique that utilizes an evolutionary algorithm to change an executable program without influencing its functionalities. | Tested against renowned real-world hardware attacks. | 1. It reduces the probability of activation of a multistage trigger Hardware Trojan. 2. It is utilized to conserve crucial infrastructures and processes with a decreased and predictable loss of performances. | Similarly to other protection solutions that depend on a probabilistic method, this technique cannot be considered entirely dependable. | Applied to integrated circuit industry against Hardware Trojan. | This approach is inefficient versus single-stage triggers and inefficient versus triggers activated by a functional behavior. Future opportunities for this research work may include resolving these problems. |
Balachandran et al. [54] (2014) | Obfuscation by code fragmentation to evade reverse engineering | It depends on shifting code bits from distinct parts of the program to a new code part, thus obfuscating the control flow of the program. | Tested by experimental analysis. | It performs well versus reverse engineering tools and performs better than other obfuscation techniques. | The time and space complexity of the software is maximized due to the introduction of instructions and code parts by the obfuscation technique. | Applied to binary programs. | This research can be improved by reducing the time and space complexity of the obfuscated software using the obfuscation approach. |
Category: Preventive Transformation Obfuscation | |||||||
Linn and Debray [55] (2003) | Obfuscation of executable code to improve resistance to static disassembly | It concentrates on the initial disassembly step. It is based on disturbing the static disassembly operation to make programs more difficult to disassemble properly. | Tested experimentally using the SPECint-95 benchmark suite. | It prevents disassembly tools from disassembling code instructions properly. | Performance degradation of obfuscated code. | Applied to executable codes against static disassembly. The system applies techniques such as inserting junk instructions and converting unconditional jumps into branch function calls to obstruct reverse engineering. Further conversions like jump table spoofing could be applied to improve the current approach. | |
Dalai et al. [56] (2017) | A code obfuscation technique to prevent reverse engineering | It depends on hiding the proprietary code part by using preventive design obfuscation and injection of self-modifying code at the binary level. | Tested experimentally using distinct sorting algorithms. | The incorporation of design-level obfuscation and the injection of self-modifying code changes the code into a semantically equal one that makes it complicated to reverse engineer. | It is not completely consistent with parallel processing where both data and code can be shared between several threads. | Applied to software codes against reverse engineering. | This research can be improved in the future by concentrating on code obfuscation along with code parallelism. |
Appendix B
Ref. | Proposed Technique | Obfuscation Processes | Evaluation Methodology | Benifits of Current Research | Cons of Current Research | Usability Within the Market | Future Opportunities and Directions |
---|---|---|---|---|---|---|---|
Category: DSP Core Obfuscation | |||||||
Sengupta and Chaurasia [69] (2022) | Securing IP cores for DSP applications using structural obfuscation and chromosomal DNA impression | It is based on utilizing multilevel structural obfuscation to protect against changing register transfer level (RTL) descriptions as well as utilizing secret chromosomal DNA impression to protect against IP privateering. | Verified by applying qualitative and quantitative analysis. | 1. It is stronger than modern facial biometric and steganography-based hardware IP protection methods in terms of more powerful proof of digital clue as well as tamper tolerance capability. 2. It affords zero design cost overhead. | N/A | Applied to DSP-based IP cores versus modification of register transfer level (RTL) description and IP privateering. | N/A |
Alaql et al. [71] (2019) | A key-error-tolerant obfuscation approach | It is based on permitting the exchanging validity of key bits with output Quality of Service (QoS) and provides agile degradation in QoS while maximizing bit error rate (BER) in the key. A CAD tool for automatic obfuscation of a design is utilized. | Tested by experimental analysis. | 1. It supplies proper functional behavior of an obfuscated design in the existence of bit failures in the key. 2. It supplies a controllable operation that permits distinct degrees of quality to be utilized for distinct IP customers. 3. It preserves an IP from untrusted examing facilities. | N/A | Applied to DSP IPs against privateering and reverse engineering. | This research work can be enhanced by tolerating a higher failure ratio in sensitive partitions, studying the efficiency of obfuscation to generic designs and more decrease in overhead. |
Rathor and Sengupta [75] (2019) | Enhanced functional obfuscation of DSP core using flip-flops and combinational logic | It is based on a functional obfuscation of the digital signal processing (DSP) core by implementing a modern IP core locking block (ILB) logic, which impacts the structure of flip-flops and combinational circuits. These ILBs conduct the locking of the functionality of a DSP design and motivate the proper functionality just on implementation of an adequate key series. | Tested by experimental analysis. | 1. It minimizes the probability of acquiring the correct key of a functionally obfuscated design in wearisome trials. 2. It provides higher protection and lower design overhead than prior works. | N/A | Applied to digital signal processing (DSP) cores against hardware menaces like Trojan insertion, privateering, and overbuilding. | N/A |
Kumar and Lovina [76] (2019) | Hardware obfuscation driven by QR pattern using high-level transformations | It uses FSM-based structural and functional obfuscation and key handling by utilizing color QR code pattern-driven random key extraction and accurately tests disruption metric levels. | Evaluated by experimental analysis. | 1. It achieves low potential, area, and trades off the accomplishment over protection level. 2. It prohibits the enemy from any reverse engineer operation in two degrees: the gate-degree and the RTL-degree geometry of IP from privateering and exaggeration. | N/A | Applied to digital signal processing (DSP) circuits against reverse engineering. | N/A |
Category: Combinational/Sequential Circuits Obfuscation | |||||||
Mirmohammadi and Borujeni [81] (2023) | Secure interference logic locking (SILL) | It depends on minimal monitorability in paths with extreme fan-out. It minimizes the number of key gates demanded for circuit obfuscation and produces the farthest Hamming distance between normal and obscure results. The key gates are appended to the circuit’s entire confusion, and the AES algorithm is utilized to produce the key. | Tested by examining SAT attack technique on ISCAS85 benchmark circuits that are obscured by SILL. | 1. It minimizes the hardware overhead while preserving its quality. 2. It minimizes the delay with the parallel application of techniques utilized in SILL. 3. It maximizes the resistance against well-known attacks like SAT. | N/A | Applied to combinational circuits against Hardware Trojan insertion. | By testing the outcomes of the application of SILL against the SAT attack, this technique meets the gauge of long attack run time, but the gauge of the number of different input styles should be considered in the future to improve this approach. |
Yue and Tehranipoor [82] (2021) | A probability-based logic locking technique: ProbLock | It is based on utilizing a filtering operation to choose the best location of key gates based on distinct restrictions. Each stage in the filtering operation produces a subgroup of nodes for each restriction. | Evaluated on 40 obfuscated sequential and combinational benchmarks from the ISCAS85 and ISCAS89 suites against SAT attack. | It achieves strong resistance against SAT attacks. | 1. Large complexity and lack of empirical data required for comparison. 2. It utilizes the same technique and test approaches when compared to other logic locking techniques. | Applied to combinational and sequential circuits against privateering. | This technique can be strengthened against SAT attacks by combining SAT-resistant logic near the key gate locations. |
Roshanisefat et al. [84] (2020) | Deep Faults and Shallow State Duality (DFSSD) | It depends on using two techniques to combat SAT attacks based on bounded model checking. These techniques are deep faults and shallow state dualism. | Evaluated by experimental analysis. | It permits the designer to accurately manage the depth of the fault at design time by utilizing a low overhead circuit technique and producing the attack time to be too long. | It can just preserve the design against enemies trying to completely reverse engineer an existing ASIC, and it does not preserve the IP versus an untrustworthy manufacturing facility. | Applied to FSM and sequential circuits with constrained access to the scan chain. | N/A |
Rezaei and Zhou [86] (2021) | Sequential logic encryption against model-checking attack | It is based on logic encryption. | Tested by applying experiments on about fifty benchmarks. | It protects sequential circuits against the model-checking attack. | N/A | Applied to sequential circuits against the model-checking attacks. | N/A |
Appendix C
Ref. | Proposed Technique | Obfuscation Processes | Evaluation Methodology | Benefits of Current Research | Cons of Current Research | Usability Within the Market | Future Opportunities and Directions |
---|---|---|---|---|---|---|---|
Category: Software–Software Obfuscation | |||||||
AlHakimi et al. [6] (2020) | Hybrid obfuscation technique to protect source code from prohibited software reverse engineering | It is based on three techniques, which are string encryption, renaming, and converting identifiers to junk code to stash the meaning and maximize the intricacy of the code. | Tested by comparing the outcomes of two experiments; the first one performed reverse engineering versus Java applications which do not utilize any preservation. The second stage performed reverse engineering versus the suggested approach. | It achieves good and promising outcomes such that it is almost impossible for the reversing tool to read the obfuscated code. | N/A | Applied to Java applications against reverse engineering. | This research can be enhanced by building a framework for the automation of this approach and supplying a plug-in to assist developers in customizing the technique of obfuscation. It can also applied for huge-scale software preservation and enhancement. |
Mahfoud et al. [96] (2020) | Hybrid obfuscation technique for reverse engineering problems | It is based on three methods of renaming, which are UNICODE Renaming Approach, String Encryption, and Identifiers Renaming to Junk Code. | Evaluated by experimental analysis. | It is efficient, as it embarrasses the compiler while reversing, and it embarrasses the reversing tool while reversing and analyzing. | This method does not prohibit reverse engineering; it embarrasses the reverser and the reversing instrument. | Applied to Java applications against reverse engineering. | Future opportunities for this research may involve enhancing this technique to prevent reverse engineering, not just embarrassing the reverser or the reversing tool. |
Hashemzade and Maroosi [97] (2018) | A hybrid signal and encryption obfuscation technique | It depends on inserting a dispatcher into the program that changes the signal program to the genuine control flow graph. In this way, the trouble of the signal technique that involves a large number of call and return instructions is solved. This dispatcher is encrypted to keep it safe from hackers. | Tested by making a comparison of the similarity among the obscure data with its actual code and with obtainable efficient techniques. | It achieves better performance when compared to the other techniques regarding preventing reconstruction of the normal code by hackers. | N/A | Applied to C++ applications against reverse engineering. | N/A |
Category: Hardware–Hardware Obfuscation | |||||||
Aksoy et al. [99] (2023) | Hybrid protection of digital FIR filters | It is based on two methods which are obfuscation and locking with a point function. It is implemented to parallel direct and transferred forms of the FIR filter and its tucked application. | Evaluated by experimental analysis. | 1. It rivals prominent logic locking methods according to hardware complexity and leads to obfuscated designs that are elastic to renowned attacks. 2. It also showed that the direct form FIR filter is a perfect nominee for safe filter application. | N/A | Applied to digital Finite Impulse Response (FIR) filter against piracy. | Studying side-channel analysis (SCA) and its effectiveness in conquering obfuscation techniques keeps an enormous path for future research. |
Nasir et al. [100] (2022) | Ephemeral key-based hybrid hardware obfuscation | It presents an ephemeral key-based hardware obfuscation with minimum resource utilization that depends on integrating static and dynamic combinational logic locking. | Evaluated by experimental analysis. | 1. It provides a black box settlement adjustable to any intellectual property, with a resource overhead of 1%. 2. It supplies reinforced preservation with minimized complexity. | N/A | Applied to ASIC ecosystem against reverse engineering (RE), IP overuse, IP piracy, and Hardware Trojan insertion. | N/A |
Rahman et al. [98] (2023) | A register transfer (RT)-level finite state machine (FSM) obfuscation technique (ReTrustFSM) | It is based on three kinds of privacy: explicit external privacy via an exterior key, implicit external privacy depending on particular clock cycles, and internal privacy through a hidden FSM transmission function. It also determines a solid connection between the features of Boolean troubles and the needed time for deobfuscation. | Evaluated by utilizing several attacks such as machine learning, structural attacks, FSM, and functional I/O queries (BMC) attacks. | 1. It permits the designer to have more monitoring and focus on the semantics of the design, extending the nature of the menace models. 2. It provides firmness versus a larger range of menaces. 3. It achieves solidness protection at acceptable overhead/corruption while combating like-threat models. | N/A | Applied to IC manufacturing against piracy. | N/A |
Category: Software–Hardware Obfuscation | |||||||
Fyrbiak et al. [101] (2017) | Hybrid obfuscation to protect against disclosure attacks on embedded microprocessors | It is based on both hardware-level and software-level obfuscation conversions to prohibit several disclosure attacks. It integrates obfuscation conversions with devoted hardware booby snares to detect and comply with manipulation efforts. | Tested by providing a new statistical evaluation technique that provides protection metrics for hybrid obfuscated programs. | 1. It is efficient against a large set of potential information disclosure attacks. 2. It provides a minor hardware. 3. Overhead of up to 14% for a plain, low-cost embedded processor. | The security analysis of these techniques for processors with dedicated cache memories is not examined. | Applied for embedded processors against reverse engineering. | This research can be improved by analyzing more obfuscation conversions like code tamper-proofing anti-emulation, and self-modifying code in association with application-specific instruction-set processor methods to reduce software performance overhead. |
McDonald et al. [106] (2021) | Software-based hardware abstraction (SBHA) | It is based on converting point functions in C programs to hardware abstractions. It supplies a normal framework where standard software obfuscation can be integrated with preservations inspired by hardware circuit obfuscation. | Tested by experimental analysis. | It is efficient in beating DSE-based attacks, with comparatively large elasticity and low overhead. | N/A | Applied to software against piracy. | Future opportunities for this research work may involve extended study of SBHA in bigger software contexts and spontaneous study of human-based reverse engineering restrictions when facing SBHA diversity. |
Chakraborty and Srivastava [104] (2019) | A hardware–software co-design-based accelerator obfuscation (HSCAO) | It is based on utilizing proprietary SDK as the origin of confidence for producing locked program binary that is thereafter deobfuscated in the hardware. | Evaluated by experimental analysis. | It provides robust designs that are elastic to state-of-the-art SAT formulation-based attacks as well as removal or bypass-type attacks. | N/A | Applied to hardware accelerator platforms against piracy. | N/A |
Šišejković et al. [107] (2020) | A secure hardware–software solution depending on RISC-V, logic locking, and microkernel | It is based on the integration of two parts to produce a trustworthy platform for protection-sensitive applications. The hardware part employment depends on trustworthy RISC-V-based RTL that is secured against malicious alterations using logic locking. The software stack part is supported by seL4; a secure OS depends on the most trustworthy microkernel obtainable. | Evaluated by experimental analysis. | It supplies a trusted computing base for protection-sensitive applications. It is directed toward implementing protection by design of both hardware (HW) and software (SW). | N/A | Applied to critical applications against piracy. | The result of testing the overall protection of this technique, its leniency to fault injections, and the power of the logic locking scheme can specify the foundation for future research improvements. |
Appendix D
Ref. | Proposed Technique | Deobfuscation Process | Evaluation Methodology | Benifits of Current Research | Cons of Current Research | Usability Within the Market | Future Opportunities and Directions |
---|---|---|---|---|---|---|---|
Category: Software Deobfuscation | |||||||
Hoekstra [112] (2021) | Deobfuscating third-party libraries in Android applications by utilizing library discovery tools | It depends on utilizing off-the-shelf library disclosure techniques for deobfuscating third-party libraries. | Tested by comparing with DeGuard deobfuscation technique that depends on statistical learning. | 1. It deobfuscates third-party libraries with huge precision. 2. It does not require a huge amount of computational resources like DeGuard. 3. Additional training samples can be added simply, while this does not occur with DeGuard. | This research utilizes a basic type of obfuscation that does not alter the structure of programs. It is not evaluated on more inclusive obfuscation types. | Deobfuscation of third-party libraries in Android apps. | This research work concentrates on handling identifier obfuscation. Future research is required to adjust and test this technique on more profound obfuscation types like class repackaging. |
Roziere et al. [114] (2021) | A Deobfuscation Pretraining Objective for Programming Languages (DOBF) | It depends on affecting the structural aspect of programming languages and pretraining a model to return the genuine version of obscured source code. | Evaluated by experimental analysis. | 1. Models pretrained with this approach largely exceed recent techniques on several downstream functions. 2. Pretrained model is capable of deobfuscating completely obscured source files and offering descriptive variable names. | Models pretrained on source code profit from structured noise need to be tested if they can be implemented to natural languages. | Deobfuscation of obfuscated source code. | This research can be enhanced by profiting from the dependency parse trees of sentences to assist in building better pretraining objectives for natural languages. |
Lee et al. [122] (2022) | Deobfuscating mobile malware for recognizing hidden behaviors (ARBDroid) | It depends on dynamically testing implementations to expose encrypted strings, classes, and hidden API calls. | Evaluated by analyzing obfuscated real-world malware. | It deobfuscates obscured applications efficiently depending on dynamic test outcomes. | This approach is deobfuscating using dynamic analysis, and therefore, deobfuscation is unattainable for the unexecuted code. | Deobfuscation of mobile malware applications. | Future improvements to this research can be achieved by automating the execution of Android malware to examine all probable execution approaches to deobfuscate obfuscated code in an application to the maximum extent. |
You et al. [129] (2022) | Defeating sophisticated control flow obfuscation by utilizing Android Runtime (ART) | It performs its deobfuscation in two phases: it defines whether a control flow obfuscation method is implemented and then deobfuscates the obscured codes. | Tested by experimental analysis. | 1. It efficiently discovers and deobfuscates the codes appended by the control flow obfuscation of DexGuard. 2. It helps malware testers to reverse control-flow-obfuscated malignant Android apps. | This approach can only treat control flow obfuscation by DexGuard and does not examine control flow obfuscation by other obfuscators involving DashO and Allatori. | Deobfuscation of Android apps. | The research work on apps with anti-tampering preservation is out of the domain of this research, and this can be considered as an opportunity for future improvements of this research. |
XIONG [131] (2022) | A general, efficient, and lightweight deobfuscation technique for PowerShell scripts | It depends on emulation-based recovery at the abstract syntax tree (AST) level to retrieve the obscured scripts. | Tested on more than 6483 obscured PowerShell scripts. | 1. It is efficacious, influential, and general. 2. It enhances the discovery rates of current virulent script detectors involving Windows Defender and the detectors in VirusTotal. | N/A | Deobfuscation of PowerShell scripts. | N/A |
Zhao et al. [133] (2021) | A technique for the deobfuscation of binaries depend on program synthesis | It is based on obfuscating binaries depending on program synthesis and utilizes a precise obfuscation detection for finding obscured code snippets using machine learning. | Evaluated by experimental analysis. | 1. It is greatly influential in finding and deobfuscating the binaries with data obfuscation, with precision reaching at least 90.34%. 2. Its success rate was maximized by 5% and efficacy maximized by 75% by comparing with other deobfuscation techniques. | 1. It is constrained to synthesizing only straight-line programs. 2. The experiments conducted in this research only concentrate on two open-source obfuscation materials, which are still lacking in terms of being convincing. | Deobfuscation of binaries with data obfuscation. | This technique is limited to synthesizing only straight-line programs. Future improvements for this research may involve expanding this technique by synthesizing the program with a loop. |
Category: Hardware Deobfuscation | |||||||
Moraitis and Dubrova [132] (2023) | FPGA design deobfuscation through iterative LUT transformation at bitstream level | It depends on guaranteeing the complete controllability of every instantiated LUT input in a design via iterative LUT alteration at bitstream degree. | Tested on the example of an obscured SNOW 3G design applied on a Xilinx 7-series FPGA. | 1. It can conquer obfuscation based on constant values and probably unlock bitstreams locked by utilizing combinational logic locking. 2. It is not also influenced by the degree of privacy of the constant values or the circuit that produces them. | This approach might not be capable of deobfuscating constructions, including triple modular redundancy or other kinds of functional duplication which cover the impact of errors. | Deobfuscation of SRAM FPGA design. | N/A |
Shamsi and Jin [128] (2021) | Circuit deobfuscation from power side channels by utilizing pseudo-Boolean SAT | It is based on utilizing a pair of attack techniques named PowerSAT attacks, which take in randomly keyed circuits and analyze key information by reacting adaptively with a side-channel “oracle”. | Tested versus simulated and real hardware traces. | It can be utilized in benign reverse engineering and hardware safety examinations. | The runtime and reliability of the PowerSAT attacks still need to be improved. | Deobfuscation of curcuits. | Enhancing the runtime and precision of the PowerSAT attacks is a significant topic for future improvements of this research. |
Shamsi et al. [137] (2017) | AppSAT: Approximately Deobfuscating Integrated Circuits | It is based on the SAT attack augmented with random querying and medium error speculation. | Examined on 71 ISCAS and MCNC benchmark circuits obscured with the AntiSAT compound scheme. | It achieved high accuracy in deobfuscating benchmark circuits that were obscured with state-of-the-art SAT attack protections. | N/A | Deobfuscation of integrated circuits. | N/A |
Appendix E
Ref. | Proposed Technique | Obfuscation Detection Processes | Evaluation Methodology | Benefits of Current Research | Cons of Current Research | Usability Within the Market | Future Opportunities and Directions |
---|---|---|---|---|---|---|---|
Ikram et al. [139] (2019) | DaDiDroid: An Android malware app detection technique | It leverages features of the weighted directed graphs of API calls to disclose the existence of malware code in obscured Android applications. | Evaluated against several elusion techniques by utilizing distinct datasets for a total of 43,262 benign and 20,431 malware apps. | 1. It is solid versus distinct code obfuscation approaches. 2. It achieved high accuracy in the classification of benign and malicious apps, reaching 96.5%. | N/A | Discovering Android malwares. | This research can be enhanced in the future by complementing characteristics originating from dynamic runtime examination of apps. |
Bacci et al. [140] (2018) | A technique to detect whether a sample of code is modified by means of one or more obfuscation methods | It is based on instituted supervised binary classification methods (SVM, Multilayer Perceptron, and Random Forest) running on ad hoc attributes originating from static test. | Tested on a real-world dataset of Android implementations (morphed and genuine). | It is utilized for recognizing whether a mobile application is changed using one or more metamorphosis approaches. | It does not achieve high accuracy in detection for all types of obfuscation. | Detecting of obfuscated codes in mobile environments (Android). | This research achieved promising outcomes for some obfuscation methods, whereas for others, the discovery looks more difficult, which needs to be resolved in future research enhancements. |
Aurangzeb and Aleem [142] (2023) | Assessment and categorization of obscured Android malware through deep learning | It utilizes both static and dynamic analysis by utilizing an ensemble voting approach and depends on a deep learning method using real and emulator-based platforms. | Tested by experimental analysis. | It is rapid, scalable, and rigorous in detecting obscured Android malware. | N/A | Detecting obfuscated Android malware. | Future opportunities of this research may involve testing the packed Android applications in association with implementing distinct kinds of obfuscations considering the least important features too. |
Kim et al. [144] (2018) | Obfuscated VBA macro discovery using machine learning technique | It depends on training five machine learning techniques on 15 distinctive static metrics considering the features of the Visual Basic for Applications (VBA) macros. | Tested by utilizing a real-world dataset of obfuscated and non-obfuscated VBA macros elicited from Microsoft Office document files. | It achieved F2 score enhancement in detecting obfuscated macro code larger than 23% compared to other related studies. | This technique is used for obfuscation detection, not pernicious code detection. | Detecting obfuscated Visual Basic for Applications (VBA) macro codes. | This research can be improved in the future to handle malicious code detection. |
Li et al. [145] (2019) | Obfusifier: obfuscation-resistant Android malware discovery technique | The training of this technique depends on obfuscation-resistant metrics elicited from unobfuscated applications, while the model retains large effectiveness for discovering obfuscated malware. | Evaluated empirically on 568 obfuscated malware. | It accomplished the accuracy, recall, and F-measure results that surpassed 95% for discovering obfuscated Android malware, well surpassing any of the prior techniques. | 1. This technique cannot treat the malware converted by the obfuscation on the native code. 2. It depends on the static test of the DEX code, but if the DEX code is encrypted and then decrypted at runtime, it cannot hold its method graph and pernicious attitudes. | Detecting obfuscated Android malware. | Future enhancements for this research may involve examining the integration of a dynamic analyzer in Obfusifier. |
Ouk and Pak [147] (2022) | A novel technique for discovering malware residing in either native code or bytecode | It is based on supplying an integrated method for eliciting metrics from applications and native libraries by utilizing a pick algorithm that can elicit a small group of unique and efficient metrics for discovering malware applications quickly and with a high discovery rate. | Evaluated by utilizing massive Android malware detection datasets gained from several sources. | It is efficient in terms of enhanced precision, low false positive rate, and high discovery rate. | This technique considers fewer factors for the detection process of malware than other approaches. | Detecting obscured and native Android malware. | This research can be enhanced in the future by involving more factors in the detection process of malware existing in either bytecode or native code. |
Ponomarenko and Klyucharev [148] (2020) | JavaScript code obfuscation discovery by utilizing artificial neural network with attention technique | It is based on adapting an artificial neural network model with an attention technique to resolve the trouble of script classification on the obfuscation foundation. | Evaluated by experimental analysis. | It can be applied with some enhancements in pernicious code discovery systems, mobile device fingerprint collection approaches, or browsers. | This technique achieved worse performance than the approach suggested by Tellenbach et al. [149]. | Detecting obfuscated JavaScript codes. | This research may be improved by utilizing metrics reflecting the frequencies of JavaScript keywords and other statistical computations to enhance the performance of this technique. |
References
- Asher, S.W.; Jan, S.; Tsaramirsis, G.; Khan, F.Q.; Khalil, A.; Obaidullah, M. Reverse Engineering of Mobile Banking Applications. Comput. Syst. Sci. Eng. 2021, 38, 265–278. [Google Scholar] [CrossRef]
- Eilam, E.; Chikofsky, E.J. Reversing: Secrets of Reverse Engineering; Wiley: Hoboken, NJ, USA, 2005. [Google Scholar]
- Danesh, A.S.; Saybani, M.R.; Danesh, S.Y.S. Software release management challenges in industry: An exploratory study. Afr. J. Bus. Manag. 2011, 5, 8050. [Google Scholar]
- Wang, W. Reverse Engineering: Technology of Reinvention; CRC Press: Boca Raton, FL, USA, 2010. [Google Scholar]
- Chen, C.; Pomonis, M.; Tang, A. CONFUSE: LLVM-Based Code Obfuscation. 2013. Available online: http://www.cs.columbia.edu/~aho/cs4115_Spring-2013/lectures/13-05-16_Team11_Confuse_Paper.pdf (accessed on 23 April 2025).
- Alhakimi, A.M.; Sultan, A.B.B.M.; Ali, N.M.; Ghani, A.A.A. Hybrid Obfuscation Technique to Protect Source Code From Prohibited Software Reverse Engineering. IEEE Access 2020, 8, 187326–187342. [Google Scholar] [CrossRef]
- Marius, P. Techniques of Program Code Obfuscation for Secure Software. J. Mobile Embed. Distrib. Syst. 2011, 3, 205–219. [Google Scholar]
- Sebastian, S.; Malgaonkar, S.; Shah, P.; Kapoor, M.; Parekhji, T. A Study and Review on Code Obfuscation. In Proceedings of the 2016 World Conference on Futuristic Trends in Research and Innovation for Social Welfare (WCFTR’16), Coimbatore, India, 29 February–1 March 2016. [Google Scholar]
- Ogiso, T.; Sakabe, Y.; Soshi, M.; Miyaji, A. Software Obfuscation on a Theoretical Basis and Its Implementation. Ieice Trans. Fundam. Electron. Commun. Comput. Sci. 2003, E86-A, 176–186. [Google Scholar]
- Wang, P.; Bao, Q.; Wang, L.; Wang, S.; Chen, Z.; Wei, T.; Wu, D. Software Protection on the Go: A Large-Scale Empirical Study on Mobile App Obfuscation. In Proceedings of the ICSE ’18: Proceedings of the 40th International Conference on Software Engineering, Gothenburg, Sweden, 27 May 2018–3 June 2018. [Google Scholar]
- Chen, T.; Boreli, R.; Kaafar, M.A.; Friedman, A. On the Effectiveness of Obfuscation Techniques in Online Social Networks. In Proceedings of the International Symposium on Privacy Enhancing Technologies Symposium, Amsterdam, The Netherlands, 16–18 July 2014. [Google Scholar]
- Drape, S. Intellectual Property Protection Using Obfuscation; OUCL: Oxford, UK, 2010. [Google Scholar]
- Sanz, M.G. Software Obfuscation Theory and Practice; Universidad Politécnica de Madrid: Madrid, Spain, 2023. [Google Scholar]
- Yuan, M.; Mu, Y.; Rezaeibagha, F.; Xu, L.; Huang, X. Controllable software licensing system for sub-licensing. J. Inf. Secur. Appl. 2022, 64, 103061. [Google Scholar] [CrossRef]
- Apon, D.; Huang, Y.; Katz, J.; Malozemoff, A.J. Implementing Cryptographic Program Obfuscation. IACR Cryptol. ePrint Arch. 2014, 779, 1–19. [Google Scholar]
- Asghar, H.J.; Zhao, B.Z.H.; Ikram, M.; Nguyen, G.; Kaafar, D.; Lamont, S. Use of Cryptography in Malware Obfuscation. arXiv 2023, arXiv:2212.04008v3. [Google Scholar] [CrossRef]
- Vijayakumar, A.; Patil, V.C.; Holcomb, D.E.; Paar, C.; Kundu, S. Physical Design Obfuscation of Hardware: A Comprehensive Investigation of Device- and Logic-Level Techniques. IEEE Trans. Inf. Forensics Secur. 2017, 12, 64–77. [Google Scholar] [CrossRef]
- Sidhu, S.; Mohd, B.J.; Hayajneh, T. Hardware Security in IoT Devices with Emphasis on Hardware Trojans. J. Sens. Actuator Netw. 2019, 8, 42. [Google Scholar] [CrossRef]
- Park, Y.; Dill, R.; Mullins, B.E. IoTAMU: Protecting Smart Home Networks via Obfuscation and Encryption. In Proceedings of the SECURWARE 2019: The Thirteenth International Conference on Emerging Security Information, Systems and Technologies, Nice, France, 27–31 October 2019. [Google Scholar]
- Chakraborty, S.; Tripp, O. Eavesdropping and obfuscation techniques for smartphones. In Proceedings of the MOBILESoft ’16: Proceedings of the International Conference on Mobile Software Engineering and Systems, Austin, TX, USA, 16–17 May 2016. [Google Scholar]
- Xie, C.; Cao, Z.; Long, Y.; Yang, D.; Zhao, D.; Li, B. Privacy of Autonomous Vehicles: Risks, Protection Methods, and Future Directions. arXiv 2022, arXiv:2209.04022. [Google Scholar]
- Nagaraju, P.; Rao, N.N. Obfuscation Techniques in Cloud Computing: A Systematic Survey. Int. J. Sci. Technol. Res. 2019, 8, 1097–1102. [Google Scholar]
- Balachandran, V. Software Protection Through Obfuscation. Doctoral Thesis, Nanyang Technological University, Singapore, 2014. [Google Scholar]
- Madou, M.; Anckaert, B.; Bus, B.D.; Bosschere, K.D. On the Effectiveness of Source Code Transformations for Binary Obfuscation. In Proceedings of the International Conference on Software Engineering Research and Practice and Conference on Programming Languages and Compilers, Las Vegas, NV, USA, 26–29 June 2006. [Google Scholar]
- Kumar, K.; Kaur, P. A Thorough Investigation of Code Obfuscation Techniques for Software Protection. Int. J. Comput. Sci. Eng. 2015, 3, 158–164. [Google Scholar]
- Lu, K.Z.M. Control Flow Obfuscation for FJ using Continuation Passing. arXiv 2020, arXiv:2012.06340. [Google Scholar]
- Li, C.; Huang, T.; Chen, X.; Xie, C.; Wen, W. IOLLVM: Enhance version of OLLVM. arXiv 2022, arXiv:2203.03169. [Google Scholar]
- BinShamlan, M.; Bamatraf, M.; Zain, A. The Impact of Control Flow Obfuscation Technique on Software Protection Against Human Attacks. In Proceedings of the 2019 First International Conference of Intelligent Computing and Engineering (ICOICE), Hadhramout, Yemen, 15–16 December 2019. [Google Scholar]
- Balachandran, V.; Keong, N.W.; Emmanuel, S. Function Level Control Flow Obfuscation for Software Security. In Proceedings of the 2014 Eighth International Conference on Complex, Intelligent and Software Intensive Systems (CISIS), Birmingham, UK, 2–4 July 2014. [Google Scholar]
- Al-Kushari, A.A.; Zahary, A.; Alkhawlani, M.M. Online Software Copyright Protection Using Trust Platform Module and Database Watermarking. J. Sci. Technol. 2013, 18. [Google Scholar] [CrossRef]
- Li, Y.; Kang, F.; Shu, H.; Xiong, X.; Sha, Z.; Sui, Z. COOPS: A Code Obfuscation Method Based on Obscuring Program Semantics. Secur. Commun. Netw. 2022, 2022, 6903370. [Google Scholar] [CrossRef]
- Sha, Z.H.; Shu, H.; Wu, C.-G.; Xiong, X.-B.; Kang, F. Deep Control Flow Obfuscation Model Based on Callback Function. J. Softw. 2021, 33, 1833–1848. [Google Scholar]
- Xie, X.; Liu, F.; Lu, B.; Xiang, F. An Iteration Obfuscation Based on Instruction Fragment Diversification and Control Flow Randomization. Int. J. Comput. Theory Eng. 2016, 8, 303–312. [Google Scholar] [CrossRef]
- Hashemzade, B.; Abdolrazzagh-Nezhad, M. CSE: A Novel Dynamic Obfuscation Based on Control Flow, Signals and Encryption. J. Comput. Secur. 2019, 6, 53–63. [Google Scholar]
- Gao, Z.; Huang, Y.; Zheng, L.; Lu, H.; Wu, B.; Zhang, J. Protecting Location Privacy of Users Based on Trajectory Obfuscation in Mobile Crowdsensing. IEEE Trans. Ind. Inform. 2022, 18, 6290–6299. [Google Scholar] [CrossRef]
- Popescu, A.B.; Taca, I.A.; Vizitiu, A.; Nita, C.I.; Suciu, C.; Itu, L.M.; Scafa-Udriste, A. Obfuscation Algorithm for Privacy-Preserving Deep Learning-Based Medical Image Analysis. Appl. Sci. 2022, 12, 3997. [Google Scholar] [CrossRef]
- Jiang, L.; Song, Q.; Tan, R.; Li, M. PriMask: Cascadable and Collusion Resilient Data Masking for Mobile Cloud Inference. arXiv 2022, arXiv:2211.06716. [Google Scholar]
- Saleem, M.U.; Reilly, D.; Fan, L. DP-Shield: Face Obfuscation with Differential Privacy. In Proceedings of the 25th International Conference on Extending Database Technology (EDBT), Edinburgh, UK, 29 March–1 April 2022. [Google Scholar]
- Hu, Z.; Havrylov, S.; Titov, I.; Cohen, S.B. Obfuscation for Privacy-preserving Syntactic Parsing. In Proceedings of the 16th International Conference on Parsing Technologies and the IWPT 2020 Shared Task, Seattle, WA, USA, 9 July 2020; pp. 62–72. [Google Scholar]
- Oli, S.A.; Arockiam, L. Enhanced Obfuscation Technique for Data Confidentiality in Public Cloud Storage. In Proceedings of the 2015 International Conference on Mechanical Engineering and Electrical Systems (ICMES 2015), Singapore, 16–18 December 2015; Volume 40. [Google Scholar]
- Amalarethinam, G.; Mary, B.F. Confidentiality technique for enhancing data security in public cloud storage using data obfuscation. IJCTA 2016, 8, 1–10. [Google Scholar]
- Sidhardhan, M.; Praveen, K. Data Obfuscation Using Secret Sharing. In Advanced Informatics for Computing Research; Springer: Cham, Switzerland, 2019; pp. 183–191. [Google Scholar]
- Parameswaran, R.; Blough, D. A Robust Data-obfuscation Approach for Privacy Preservation of Clustered Data. In Proceedings of the Workshop on Privacy and Security Aspects of Data Mining, Atlantic City, NJ, USA, 14–17 November 2015; pp. 18–25. [Google Scholar]
- Damiani, E.; di Vimercati, S.D.C.; Paraboschi, S.; Samarati, P. Computing Range Queries on Obfuscated Data. 2004. Available online: https://spdp.di.unimi.it/papers/ipmu04.pdf (accessed on 23 April 2025).
- Parameswaran, R.; Blough, D.M. Privacy Preserving Collaborative Filtering using Data Obfuscation. In Proceedings of the 2007 IEEE International Conference on Granular Computing, San Jose, CA, USA, 1–4 November 2007. [Google Scholar]
- Masood, R.; Vatsalan, D.; Ikram, M.; Kaafar, M.A. Incognito: A Method for Obfuscating Web Data. In Proceedings of the 2018 World Wide Web Conference (WWW ’18), International World Wide Web Conferences Steering Committee, Lyon, France, 23–27 April 2018; pp. 267–276. [Google Scholar]
- Khan, K.M.; Shaheen, M. Data Obfuscation for Privacy and Confidentiality in Cloud Computing. In Proceedings of the 2015 IEEE International Conference on Software Quality, Reliability and Security-Companion, Vancouver, BC, Canada, 3–5 August 2015; pp. 195–196. [Google Scholar]
- Kaur, J.; Agrawal, A.; Khan, R.A. Encryfuscation: A model for preserving data and location privacy in fog based IoT scenario. J. King Saud Univ.-Comput. Inf. Sci. 2022, 34, 6808–6817. [Google Scholar] [CrossRef]
- Ogigau-Neamtiu, F. Automating the Data Security Process. J. Def. Resour. Manag. 2017, 8, 91–100. [Google Scholar]
- Monikandan, S.; Arockiam, L. Confidentiality Technique to Enhance Security of Data in Public Cloud Storage using Data Obfuscatio. Indian J. Sci. Technol. 2015, 8, 1. [Google Scholar] [CrossRef]
- Marcelli, A.; Sanchez, E.; Squillero, G.; Jamal, M.U.; Imtiaz, A.; Machetti, S.; Mangani, F.; Monti, P.; Pola, D.; Salvato, A.; et al. Defeating hardware Trojan in microprocessor cores through software obfuscation. In Proceedings of the 2018 IEEE 19th Latin-American Test Symposium (LATS), Sao Paulo, Brazil, 12–14 March 2018; pp. 1–6. [Google Scholar]
- Chan, J.-T.; Yang, W. Advanced obfuscation techniques for java bytecode. J. Syst. Softw. 2004, 71, 1–10. [Google Scholar] [CrossRef]
- Popov, I.V.; Debray, S.K.; Andrews, G.R. Binary Obfuscation Using Signals. In Proceedings of the 16th USENIX Security Symposium on USENIX Security Symposium, Boston, MA, USA, 6–10 August 2007. [Google Scholar]
- Balachandran, V.; Emmanuel, S.; Keong, N.W. Obfuscation by Code Fragmentation to Evade Reverse Engineering. In Proceedings of the 2014 IEEE International Conference on Systems, Man, and Cybernetics (SMC), San Diego, CA, USA, 5–8 October 2014. [Google Scholar]
- Linn, C.; Debray, S. Obfuscation of Executable Code to Improve Resistance to Static Disassembly. In Proceedings of the 10th ACM Conference on Computer and Communications Security, Washington, DC, USA, 27–31 October 2003. [Google Scholar]
- Dalai, A.K.; Das, S.S.; Jena, S.K. A code obfuscation technique to prevent reverse engineering. In Proceedings of the 2017 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET), Chennai, India, 22–24 March 2017. [Google Scholar]
- Greco, C.; Ianni, M.; Guzzo, A.; Fortino, G. Enabling Obfuscation Detection in Binary Software through eXplainable AI. IEEE Trans. Emerg. Top. Comput. 2024. [Google Scholar] [CrossRef]
- Sumathi, G.; Srivani, L.; Murthy, D.T.; Kumar, A.; Madhusoodanan, K. Hardware Obfuscation Using Different Obfuscation Cell Structures for PLDs. In Proceedings of the 2nd Singapore Cyber Security R and D Conference, Singapore, 21–22 February 2017; Volume 15. [Google Scholar]
- Shakya, B.; Tehranipoor, M.; Bhunia, S.; Forte, D. Introduction to Hardware Obfuscation: Motivation, Methods and Evaluation. In Hardware Protection Through Obfuscation; Springer International Publishing AG: New York, NY, USA, 2017. [Google Scholar]
- Amir, S.; Shakya, B.; Xu, X.; Jin, Y.; Bhunia, S.; Tehranipoor, M.; Forte, D. Development and Evaluation of Hardware Obfuscation Benchmarks. J. Hardw. Syst. Secur. 2018, 2, 142–161. [Google Scholar] [CrossRef]
- Sengupta, A.; Kachave, D.; Roy, D. Low Cost Functional Obfuscation of Reusable IP Cores used in CE Hardware through Robust Locking. IEEE Trans. Comput. Des. Integr. Circuits Syst. 2018, 38, 604–616. [Google Scholar] [CrossRef]
- Sengupta, A.; Roy, D. Protecting an Intellectual Property Core during Architectural Synthesis using High-Level Transformation Based Obfuscation. IET Electron. Lett. 2017, 53, 849–851. [Google Scholar] [CrossRef]
- Yasin, M.; Rajendran, J.; Sinanoglu, O.; Karri, R. On improving the security of logic locking. IEEE Trans. Comput.-Aided Des. Integr. Circuits Syst. 2016, 35, 1411–1424. [Google Scholar] [CrossRef]
- Sengupta, A.; Mohanty, S. Functional Obfuscation of DSP cores using Robust Logic Locking and Encryption. In Proceedings of the 2018 IEEE Computer Society Annual Symposium on VLSI (ISVLSI), Hong Kong, China, 8–11 July 2018. [Google Scholar]
- Koteshwara, S.; Kim, C.H.; Parhi, K.K. Mode-based Obfuscation using Control-Flow Modifications. In Proceedings of the Third Workshop on Cryptography and Security in Computing Systems, Prague, Czech Republic, 20 January 2016; pp. 19–24. [Google Scholar]
- Sengupta, A.; Mohanty, S.P.; Pescador, F.; Corcoran, P. Multi-Phase Obfuscation of Fault Secured DSP Designs with Enhanced Security Feature. IEEE Trans. Consum. Electron. 2018, 64, 356–364. [Google Scholar] [CrossRef]
- Sengupta, A.; Neema, S.; Sarkar, P.; Mohanty, S.H.P.S.P.; Naskar, M.K. Obfuscation of Fault Secured DSP Design through Hybrid Transformation. In Proceedings of the 2018 IEEE Computer Society Annual Symposium on VLSI, Hong Kong, China, 8–11 July 2018. [Google Scholar]
- Lao, Y.; Parhi, K.K. Protecting DSP Circuits through Obfuscation. In Proceedings of the 2014 IEEE International Symposium on Circuits and Systems (ISCAS), Melbourne, VIC, Australia, 1–5 June 2014. [Google Scholar]
- Sengupta, A.; Rathor, M. Security of Functionally Obfuscated DSP Core Against Removal Attack Using SHA-512 Based Key Encryption Hardware. IEEE Access 2018, 7, 4598–4610. [Google Scholar] [CrossRef]
- Sengupta, A.; Chaurasia, R. Securing IP Cores for DSP Applications Using Structural Obfuscation and Chromosomal DNA Impression. IEEE Access 2022, 10, 50903–50913. [Google Scholar] [CrossRef]
- Alaql, A.; Hoque, T.; Forte, D.; Bhunia, S. Quality Obfuscation for Error-Tolerant and Adaptive Hardware IP Protection. In Proceedings of the 2019 IEEE 37th VLSI Test Symposium (VTS), Monterey, CA, USA, 23–25 April 2019. [Google Scholar]
- Priya, A.; Lakshmi, S. Obfuscating DSP Circits via High Level Transformations. IEEE Trans. Very Large Scale Integr. (Vlsi) Syst. 2015, 23, 819–830. [Google Scholar]
- Aparna, C.; Lavanya, S.; Kumaran, M.E. Obfuscating DSP Circuits Through QR Based Key Driven High- Level Transformations. In Proceedings of the International Conference on Innovative Trends in Engineering and Technology 2017, Antalya, Turkey, 21–23 August 2017. [Google Scholar]
- Sengupta, A.; Roy, D.; Mohanty, S.P. DSP Design Protection in CE through Algorithmic Transformation Based Structural Obfuscation. IEEE Trans. Consum. Electron. 2017, 63, 467–476. [Google Scholar] [CrossRef]
- Rathor, M.; Sengupta, A. Enhanced Functional Obfuscation of DSP core using Flip-Flops and Combinational logic. In Proceedings of the 2019 IEEE 9th International Conference on Consumer Electronics (ICCE-Berlin), Berlin, Germany, 8–11 September 2019. [Google Scholar]
- Kumar, D.R.V.A.S.; Lovina, P.A. Hardware Obfuscation Driven by QR Pattern using High Level Transformations. Int. J. Adv. Trends Comput. Sci. Eng. 2019, 8, 38–41. [Google Scholar]
- Blocklove, J. Hardware Intellectual Property Protection Through Obfuscation Methods. Master’s Thesis, Rochester Institute of Technology, Rochester, NY, USA, 2020. [Google Scholar]
- Amir, S.; Shakya, B.; Forte, D.; Tehranipoor, M.; Bhunia, S. Comparative Analysis of Hardware Obfuscation for IP Protection. In Proceedings of the GLSVLSI ’17: Proceedings of the on Great Lakes Symposium on VLSI 2017, Banff, AB, Canada, 10–12 May 2017. [Google Scholar]
- Karmakar, R.; Jana, S.S.; Chattopadhyay, S. A Cellular Automata Guided Obfuscation Strategy For Finite-State-Machine Synthesis. In Proceedings of the 2019 56th ACM/IEEE Design Automation Conference (DAC), Las Vegas, NV, USA, 2–6 June 2019. [Google Scholar]
- Chakraborty, R.S.; Bhunia, S. HARPOON: An obfuscation-based soc design methodology for hardware protection. IEEE Trans. Cad Integr. Circuits Syst. 2009, 28, 1493–1502. [Google Scholar] [CrossRef]
- Mirmohammadi, Z.; Borujeni, S.E. A New Optimal Method for the Secure Design of Combinational Circuits against Hardware Trojans Using Interference Logic Locking. Electronics 2023, 12, 1107. [Google Scholar] [CrossRef]
- Yue, M.; Tehranipoor, S. A Novel Probability-Based Logic-Locking Technique: ProbLock. Sensors 2021, 21, 8126. [Google Scholar] [CrossRef] [PubMed]
- Rezaei, A.; Shen, Y.; Kong, S.; Gu, J.; Zhou, H. Cyclic Locking and Memristor-based Obfuscation Against CycSAT and Inside Foundry Attacks. In Proceedings of the 2018 Design, Automation and Test in Europe Conference and Exhibition (DATE), Dresden, Germany, 19–23 March 2018. [Google Scholar]
- Roshanisefat, S.; Kamali, H.M.; Azar, K.Z.; Dinakarrao, S.M.P. DFSSD: Deep Faults and Shallow State Duality, A Provably Strong Obfuscation Solution for Circuits with Restricted Access to Scan Chain. In Proceedings of the 2020 IEEE 38th VLSI Test Symposium (VTS), San Diego, CA, USA, 5–8 April 2020. [Google Scholar]
- Meade, T.; Zhao, Z.; Zhang, S.; Pan, D.; Jin, Y. Revisit Sequential Logic Obfuscation: Attacks and Defenses. In Proceedings of the 2017 IEEE International Symposium on Circuits and Systems (ISCAS), Baltimore, MD, USA, 28–31 May 2017. [Google Scholar]
- Rezaei, A.; Zhou, H. Sequential Logic Encryption Against Model Checking Attack. In Proceedings of the 2021 Design, Automation and Test in Europe Conference and Exhibition (DATE), Virtually, 1–5 February 2021. [Google Scholar]
- Li, L.; Zhou, H. Structural Transformation for Best-Possible Obfuscation of Sequential Circuits. In Proceedings of the 2013 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST), Austin, TX, USA, 2–3 June 2013. [Google Scholar]
- Shamsi, K.; Li, M.; Meade, T.; Zhao, Z.; Pan, D.Z.; Jin, Y. Cyclic Obfuscation for Creating SAT-Unresolvable Circuits. In Proceedings of the on Great Lakes Symposium on VLSI 2017, Banff, AB, Canada, 10–12 May 2017; pp. 173–178. [Google Scholar]
- Rezaei, A.; Gu, J.; Zhou, H. Hybrid Memristor-CMOS Obfuscation Against Untrusted Foundries. In Proceedings of the 2019 IEEE Computer Society Annual Symposium on VLSI (ISVLSI), Miami, FL, USA, 15–17 July 2019. [Google Scholar]
- Imeson, F.; Emtenan, A.; Garg, S.; Tripunitara, M.V. Securing Computer Hardware Using 3D Integrated Circuit (IC) Technology and Split Manufacturing for Obfuscation. In Proceedings of the SEC’13: Proceedings of the 22nd USENIX Conference on Security, Washington, DC, USA, 14–16 August 2013; pp. 495–510. [Google Scholar]
- Koteshwara, S.; Kim, C.H.; Parhi, K.K. Key-Based Dynamic Functional Obfuscation of Integrated Circuits using Sequentially-Triggered Mode-Based Design. IEEE Trans. Inf. Forensics Secur. 2018, 13, 79–93. [Google Scholar] [CrossRef]
- Chakraborty, R.S.; Bhunia, S. Hardware protection and authentication through netlist level obfuscation. In Proceedings of the 2008 IEEE/ACM International Conference on Computer-Aided Design, San Jose, CA, USA, 10–13 November 2008. [Google Scholar]
- Chakraborty, R.S.; Bhunia, S. RTL Hardware IP Protection Using Key-Based Control and Data Flow Obfuscation. In Proceedings of the 2010 23rd International Conference on VLSI Design, Bangalore, India, 3–7 January 2010. [Google Scholar]
- Roy, J.A.; Koushanfar, F.; Markov, I.L. EPIC: Ending piracy of integrated circuits. In Proceedings of the 2008 Design, Automation and Test in Europe, Munich, Germany, 10–14 March 2008. [Google Scholar]
- Wintenberg, A.; Ozay, N.; Lafortune, S. Integrating Obfuscation and Control for Privacy. IEEE Trans. Autom. Control. 2025. [Google Scholar] [CrossRef]
- Mahfoud, A.; Sultan, A.B.M.; Abd, A.A.; Ali, N.M.; Admodisastro, N. Hybrid Obfuscation Technique for Reverse Engineering Problems. J. Comput. Sci. Comput. Math. 2020, 10, 55–59. [Google Scholar] [CrossRef]
- Hashemzade, B.; Maroosi, A. Hybrid Obfuscation Using Signals and Encryption. J. Comput. Netw. Commun. 2018, 2018, 6873807. [Google Scholar] [CrossRef]
- Rahman, M.S.; Guo, R.; Kamali, H.M.; Rahman, F.; Farahmandi, F.; Tehranipoor, M. ReTrustFSM: Toward RTL Hardware Obfuscation-A Hybrid FSM Approach. IEEE Access 2023, 11, 19741–19761. [Google Scholar] [CrossRef]
- Aksoy, L.; Nguyen, Q.L.; Almeida, F.; Raik, J.; Flottes, M.L.; Dupuis, S.; Pagliarini, S. Hybrid Protection of Digital FIR Filters. arXiv 2023, arXiv:2301.11115. [Google Scholar] [CrossRef]
- Nasir, N.; Malik, A.A.; Tahir, I.; Masood, A.; Riaz, N. Ephemeral Key-based Hybrid Hardware Obfuscation. In Proceedings of the 2022 19th International Bhurban Conference on Applied Sciences and Technology (IBCAST), Islamabad, Pakistan, 16–20 August 2022; pp. 646–652. [Google Scholar]
- Fyrbiak, M.; Rokicki, S.; Bissantz, N.; Tessier, R.; Paar, C. Hybrid Obfuscation to Protect against Disclosure Attacks on Embedded Microprocessors. IEEE Trans. Comput. 2017, 67, 307–321. [Google Scholar] [CrossRef]
- Zhuang, X.; Zhang, T.; Lee, H.H.S.; Pande, S. Hardware Assisted Control Flow Obfuscation for Embedded Processors. In Proceedings of the 2004 International Conference on Compilers, Architecture, and Synthesis for Embedded Systems, Washington, DC, USA, 22–25 September 2004. [Google Scholar]
- Fu, B.; Aravalli, S.K.; Abraham, J. Software Protection by Hardware and Obfuscation. In Proceedings of the 2007 International Conference on Security and Management, Las Vegas, NA, USA, 25–28 June 2007. [Google Scholar]
- Chakraborty, A.; Srivastava, A. Hardware-Software Co-Design Based Obfuscation of Hardware Accelerators. In Proceedings of the 2019 IEEE Computer Society Annual Symposium on VLSI (ISVLSI), Miami, FL, USA, 15–17 July 2019. [Google Scholar]
- Schrittwieser, S.; Katzenbeisser, S.; Merzdovnik, G.; Kieseberg, P.; Weippl, E. AES-SEC: Improving Software Obfuscation through Hardware-Assistance. In Proceedings of the 2014 Ninth International Conference on Availability, Reliability and Security, Fribourg, Switzerland, 8–12 September 2014; pp. 184–191. [Google Scholar]
- McDonald, J.T.; Manikyam, R.K.; Bardin, S.; Bonichon, R.; Andel, T.R. Program Protection through Software-based Hardware Abstraction. In Proceedings of the 18th International Conference on Security and Cryptography (SECRYPT 2021), Rome, Italy, 10–12 July 2021; pp. 247–258. [Google Scholar]
- Šišejković, D.; Merchant, F.; Reimann, L.M.; Leupers, R.; Giacometti, M.; Kegreiß, S. A Secure Hardware-Software Solution Based on RISC-V, Logic Locking and Microkernel. In Proceedings of the 23th International Workshop on Software and Compilers for Embedded Systems (SCOPES ’20), St. Goar, Germany, 25–26 May 2020; pp. 62–65. [Google Scholar]
- Yadegari, B.; Johannesmeyer, B.; Whitely, B.; Debray, S. A Generic Approach to Automatic Deobfuscation of Executable Code. In Proceedings of the 2015 IEEE Symposium on Security and Privacy, San Jose, CA, USA, 18–20 May 2015; pp. 674–691. [Google Scholar]
- Kan, Z.; Wang, H.; Wu, L.; Guo, Y.; Luo, D. Automated Deobfuscation of Android Native Binary Code. arXiv 2019, arXiv:1907.06828. [Google Scholar]
- Ndichu, S.; Kim, S.; Ozawa, S. Deobfuscation, Unpacking, and Decoding of Obfuscated Malicious JavaScript for Machine Learning Models Detection Performance Improvement. Caai Trans. Intell. Technol. 2020, 5, 184–192. [Google Scholar] [CrossRef]
- Wressnegger, C.; Boldewin, F.; Rieck, K. Deobfuscating Embedded Malware Using Probable-Plaintext Attacks. In International Workshop on Recent Advances in Intrusion Detection; Springer: Berlin/Heidelberg, Germany, 2013. [Google Scholar]
- Hoekstra, A.S. Deobfuscating Third Party Libraries in Android Applications Using Library Detection Tools. Master’s Thesis, University of Twente, Enschede, The Netherlands, 2021. [Google Scholar]
- Liang, M.; Li, Z.; Zeng, Q.; Fang, Z. Deobfuscation of Virtualization-Obfuscated Code Through Symbolic Execution and Compilation Optimization. In Information and Communications Security, Proceedings of the 19th International Conference, Beijing, China, 6–8 December 2017; Springer International Publishing: Cham, Switzerland, 2018; pp. 313–324. [Google Scholar]
- Roziere, B.; Lachaux, M.; Szafraniec, M.; Lample, G. DOBF: A Deobfuscation Pre-Training Objective for Programming Languages. arXiv 2021, arXiv:2102.07492. [Google Scholar]
- Tofighi-Shirazi, R.; Christofi, M.; Elbaz-Vincent, P.; Le, T. DoSE: Deobfuscation based on Semantic Equivalence. In Proceedings of the 8th Software Security, Protection, and Reverse Engineering Workshop, San Juan, Puerto Rico, 3–4 December 2018. [Google Scholar]
- Li, Z.; Chen, Q.A.; Xiong, C.; Chen, Y.; Zhu, T.; Yang, H. Effective and Light-Weight Deobfuscation and Semantic-Aware Attack Detection for PowerShell Scripts. In Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security (CCS ’19), London, UK, 11–15 November 2019. [Google Scholar]
- Säıdi, H.; Porras, P.A.; Yegneswaran, V. Experiences in Malware Binary Deobfuscation. Virus Bull. 2010, 1, 1. [Google Scholar]
- Tang, Z.; Kuang, K.; Wang, L.; Xue, C.; Gong, X.; Chen, X. SEEAD: A Semantic-Based Approach for Automatic Binary Code De-obfuscation. In Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, 1–4 August 2017; pp. 261–268. [Google Scholar]
- Lee, H.; Ng, A. Spam Deobfuscation using a Hidden Markov Model. In Proceedings of the CEAS 2005—Second Conference on Email and Anti-Spam, Stanford, CA, USA, 21–22 July 2005. [Google Scholar]
- Yoo, W.; Ji, M.; Kang, M.; Yi, J.H. String Deobfuscation Scheme based on Dynamic Code Extraction for Mobile Malwares. IT Converg. Pract. 2016, 4, 1–8. [Google Scholar]
- Salwan, J.; Bardin, S.; Potet, M.L. Symbolic Deobfuscation: From Virtualized Code Back to the Original. In Proceedings of the International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, Saclay, France, 28–29 June 2018. [Google Scholar]
- Lee, D.; Jeon, G.; Lee, S.; Cho, H. Deobfuscating Mobile Malware for Identifying Concealed Behaviors. Comput. Mater. Contin. 2022, 72, 5909–5923. [Google Scholar] [CrossRef]
- Momeni, B.; Kharrazi, M. Twinner: A Framework for Automated Software Deobfuscation. Sci. Iran. 2019, 26, 3485–3509. [Google Scholar] [CrossRef]
- Saeed-uz-zaman; Li, B.; Hamid, M.; Saleem, M.; Aman, M. A4FL: Federated Adversarial Defense via Adversarial Training and Pruning Against Backdoor Attack. IEEE Access 2025, 13, 91070–91088. [Google Scholar] [CrossRef]
- Bichsel, B.; Raychev, V.; Tsankov, P.; Vechev, M. Statistical Deobfuscation of Android Applications. In Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security (CCS ’16), Vienna, Austria, 24–28 October 2016; pp. 343–355. [Google Scholar]
- Su, F.; Bell, J.; Kaiser, G.; Ray, B. Deobfuscating Android Applications Through Deep Learning. 2017. Available online: https://mice.cs.columbia.edu/getTechreport.php?techreportID=1632 (accessed on 23 April 2025).
- You, G.; Kim, G.; Park, J.; Cho, S.; Park, M. Reversing Obfuscated Control Flow Structures in Android Apps using ReDex Optimizer. In Proceedings of the SMA 2020: The 9th International Conference on Smart Media and Applications, Jeju, Republic of Korea, 17–19 September 2020; pp. 272–276. [Google Scholar]
- Shamsi, K.; Jin, Y. Circuit Deobfuscation from Power Side-Channels using Pseudo-Boolean SAT. In Proceedings of the 2021 IEEE/ACM International Conference On Computer Aided Design (ICCAD), Munich, Germany, 1–4 November 2021; pp. 1–9. [Google Scholar]
- You, G.; Kim, G.; Han, S.; Park, M.; Cho, S.-J. Deoptfuscator: Defeating Advanced Control-Flow Obfuscation Using Android Runtime (ART). IEEE Access 2022, 10, 61426–61440. [Google Scholar] [CrossRef]
- Garba, P.; Favaro, M. SATURN—Software Deobfuscation Framework Based On LLVM. In Proceedings of the 3rd ACM Workshop on Software Protection, London, UK, 15 November 2019; pp. 27–38. [Google Scholar]
- Xiong, C.; Li, Z.; Chen, Y.; Zhu, T.; Wang, J.; Yang, H.; Ruan, W. Generic, efficient, and effective deobfuscation and semantic-aware attack detection for PowerShell scripts. Front. Inform. Technol. Electron. Eng. 2022, 23, 361–381. [Google Scholar] [CrossRef]
- Moraitis, M.; Dubrova, E. FPGA Design Deobfuscation by Iterative LUT Modification at Bitstream Level. J. Hardw. Syst. Secur. 2023, 7, 11–24. [Google Scholar] [CrossRef]
- Zhao, Y.; Tang, Z.; Ye, G.; Gong, X.; Fang, D. Input-Output Example-Guided Data Deobfuscation on Binary. Secur. Commun. Netw. 2021, 2021, 4646048. [Google Scholar] [CrossRef]
- Lu, X.; Zhuge, J.; Wang, R.; Cao, Y.; Chen, Y. De-obfuscation and Detection of Malicious PDF Files with High Accuracy. In Proceedings of the 2013 46th Hawaii International Conference on System Sciences, Wailea, HI, USA, 7–10 January 2013. [Google Scholar]
- Sørensen, L.T.; Larsen, M.M. WordAdjust—A Deobfuscation Frontend to Content-Aware Anti-Spam Tools. 2018. Available online: https://vbn.aau.dk/ws/files/61072996/1213098364.pdf (accessed on 23 April 2025).
- Wong, M.Y.; Lie, D. Tackling runtime-based obfuscation in Android with TIRO. In Proceedings of the SEC’18: Proceedings of the 27th USENIX Conference on Security Symposium, Baltimore, MD, USA, 15–17 August 2018. [Google Scholar]
- Shamsi, K.; Li, M.; Meade, T.; Zhao, Z.; Pan, D.Z.; Jin, Y. AppSAT: Approximately deobfuscating integrated circuits. In Proceedings of the 2017 IEEE International Symposium on Hardware Oriented Security and Trust (HOST), McLean, VA, USA, 1–5 May 2017; pp. 95–100. [Google Scholar]
- Dhanya, K.; Dheesha, O.; Kumar, T.; Vinod, P. Detection of Obfuscated Mobile Malware with Machine Learning and Deep Learning Models. In Machine Learning and Metaheuristics Algorithms, and Applications; Springer: Singapore, 2021. [Google Scholar]
- Ikram, M.; Beaume, P.; Kaafar, M.A. DaDiDroid: An Obfuscation Resilient Tool for Detecting Android Malware via Weighted Directed Call Graph Modelling. arXiv 2019, arXiv:1905.09136. [Google Scholar] [CrossRef]
- Bacci, A.; Bartoli, A.; Martinelli, F.; Medvet, E.; Mercaldo, F. Detection of Obfuscation Techniques in Android Applications. In Proceedings of the ARES 2018: Proceedings of the 13th International Conference on Availability, Reliability and Security, Hamburg, Germany, 27–30 August 2018. [Google Scholar]
- Suarez-Tangil, G.; Dash, S.K.; Ahmadi, M.; Kinder, J.; Giacinto, G.; Cavallaro, L. DroidSieve: Fast and Accurate Classification of Obfuscated Android Malware. In Proceedings of the Conference on Data and Application Security and Privacy (CODASPY), Scottsdale, AZ, USA, 22–24 March 2017. [Google Scholar]
- Aurangzeb, S.; Aleem, M. Evaluation and classifcation of obfuscated Android malware through deep learning using ensemble voting mechanism. Sci. Rep. 2023, 13, 3093. [Google Scholar] [CrossRef] [PubMed]
- Pan, J.; Mao, X. Obfuscated Malicious JavaScript Detection by Machine Learning. In Proceedings of the 2nd International Conference on Advances in Mechanical Engineering and Industrial Informatics, Hangzhou, China, 9–10 April 2016. [Google Scholar]
- Kim, S.; Hong, S.; Oh, J.; Lee, H. Obfuscated VBA Macro Detection Using Machine Learning. In Proceedings of the 2018 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, Luxembourg, 25–28 June 2018. [Google Scholar]
- Li, Z.; Sun, J.; Yan, Q.; Srisa-an, W.; Tsutano, Y. Obfusifier: Obfuscation-Resistant Android Malware Detection System. In Proceedings of the International Conference on Security and Privacy in Communication Systems, Orlando, VA, USA, 23–25 October 2019; pp. 214–234. [Google Scholar]
- Markowsky, G.; Savenko, O.; Lysenko, S.; Nicheporuk, A. The Technique for Metamorphic Viruses’ Detection Based on its Obfuscation Features Analysis. In Proceedings of the 14th International Conference on ICT in Education, Research and Industrial Applications, Kyiv, Ukraine, 14–17 May 2018; Volume 2104, pp. 680–687. [Google Scholar]
- Ouk, P.; Pak, W. Unified Detection of Obfuscated and Native Android Malware. Comput. Mater. Contin. 2022, 70, 3099–3116. [Google Scholar]
- Ponomarenko, G.; Klyucharev, P. JavaScript Programs Obfuscation Detection Method that Uses Artificial Neural Network with Attention Mechanism. In Proceedings of the Secure Information Technologies 2019 (BIT 2019), Moscow, Russia, 20–23 February 2019. [Google Scholar]
- Tellenbach, B.; Paganoni, S.; Rennhard, M. Detecting obfuscated JavaScripts from known and unknown obfuscators using machine learning. Int. J. Adv. Secur. 2016, 9, 196–206. [Google Scholar]
Ref. | Category | Tested | Usability | Potential |
---|---|---|---|---|
[26] | Control Flow | Yes | Yes | No |
[31] | Control Flow | Yes | Yes | Yes |
[39] | Data | Yes | Yes | No |
[48] | Data | Yes | Yes | Yes |
[51] | Layout | Yes | Yes | Yes |
[56] | Preventive | Yes | Yes | Yes |
Ref. | Category | Tested | Usability | Potential |
---|---|---|---|---|
[69] | DSP Core | Yes | Yes | No |
[70] | DSP Core | Yes | Yes | Yes |
[79] | Combinational/Sequential Circuits | Yes | Yes | Yes |
[81] | Combinational/Sequential Circuits | Yes | Yes | Yes |
[83] | Combinational/Sequential Circuits | Yes | Yes | No |
Ref. | Category | Tested | Usability | Potential |
---|---|---|---|---|
[6] | Software–Software | Yes | Yes | Yes |
[94] | Software–Software | Yes | Yes | Yes |
[96] | Hardware–Hardware | Yes | Yes | No |
[97] | Hardware–Hardware | Yes | Yes | Yes |
[102] | Software–Hardware | Yes | Yes | No |
[104] | Software–Hardware | Yes | Yes | Yes |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2025 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Saleh, K.; Darweesh, D.; Darwish, O.; Hammad, E.; Amsaad, F. Hardware and Software Methods for Secure Obfuscation and Deobfuscation: An In-Depth Analysis. Computers 2025, 14, 251. https://doi.org/10.3390/computers14070251
Saleh K, Darweesh D, Darwish O, Hammad E, Amsaad F. Hardware and Software Methods for Secure Obfuscation and Deobfuscation: An In-Depth Analysis. Computers. 2025; 14(7):251. https://doi.org/10.3390/computers14070251
Chicago/Turabian StyleSaleh, Khaled, Dirar Darweesh, Omar Darwish, Eman Hammad, and Fathi Amsaad. 2025. "Hardware and Software Methods for Secure Obfuscation and Deobfuscation: An In-Depth Analysis" Computers 14, no. 7: 251. https://doi.org/10.3390/computers14070251
APA StyleSaleh, K., Darweesh, D., Darwish, O., Hammad, E., & Amsaad, F. (2025). Hardware and Software Methods for Secure Obfuscation and Deobfuscation: An In-Depth Analysis. Computers, 14(7), 251. https://doi.org/10.3390/computers14070251