This paper introduces a novel approach for the automated selection of software protections to mitigate \acrlong{mate} risks against critical assets within software applications. We formalize the key elements involved in protection decision-making --- including code artifacts, assets, security requirements, attacks, and software protections --- and frame the protection process through a model inspired by game theory. In this model, a defender strategically applies protections to various code artifacts of a target application, anticipating repeated attack attempts by adversaries against the confidentiality and integrity of the application's assets. The selection of the optimal defense maximizes resistance to attacks while ensuring the application remains usable by constraining the overhead introduced by protections. The game is solved through a heuristic based on a mini-max depth-first exploration strategy, augmented with dynamic programming optimizations for improved efficiency. Central to our formulation is the introduction of the Software Protection Index, an original contribution that extends existing notions of potency and resilience by evaluating protection effectiveness against attack paths using software metrics and expert assessments. We validate our approach through a proof-of-concept implementation and expert evaluations, demonstrating that automated software protection is a practical and effective solution for risk mitigation in software.

Empirical assessment of the code comprehension effort needed to attack programs protected with obfuscation / Regano, L.; Canavese, D.; Basile, C.; Torchiano, M.. - In: COMPUTERS & SECURITY. - ISSN 0167-4048. - ELETTRONICO. - 166:(2026). [10.1016/j.cose.2026.104881]

Empirical assessment of the code comprehension effort needed to attack programs protected with obfuscation

Regano L.;Canavese D.;Basile C.;Torchiano M.
2026

Abstract

This paper introduces a novel approach for the automated selection of software protections to mitigate \acrlong{mate} risks against critical assets within software applications. We formalize the key elements involved in protection decision-making --- including code artifacts, assets, security requirements, attacks, and software protections --- and frame the protection process through a model inspired by game theory. In this model, a defender strategically applies protections to various code artifacts of a target application, anticipating repeated attack attempts by adversaries against the confidentiality and integrity of the application's assets. The selection of the optimal defense maximizes resistance to attacks while ensuring the application remains usable by constraining the overhead introduced by protections. The game is solved through a heuristic based on a mini-max depth-first exploration strategy, augmented with dynamic programming optimizations for improved efficiency. Central to our formulation is the introduction of the Software Protection Index, an original contribution that extends existing notions of potency and resilience by evaluating protection effectiveness against attack paths using software metrics and expert assessments. We validate our approach through a proof-of-concept implementation and expert evaluations, demonstrating that automated software protection is a practical and effective solution for risk mitigation in software.
File in questo prodotto:
File Dimensione Formato  
1-s2.0-S016740482600057X-main.pdf

accesso aperto

Tipologia: 2a Post-print versione editoriale / Version of Record
Licenza: Creative commons
Dimensione 4.01 MB
Formato Adobe PDF
4.01 MB Adobe PDF Visualizza/Apri
Pubblicazioni consigliate

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/11583/3008858