This paper introduces a novel approach for the automated selection of software protections to mitigate \acrlong{mate} risks against critical assets within software applications. We formalize the key elements involved in protection decision-making --- including code artifacts, assets, security requirements, attacks, and software protections --- and frame the protection process through a model inspired by game theory. In this model, a defender strategically applies protections to various code artifacts of a target application, anticipating repeated attack attempts by adversaries against the confidentiality and integrity of the application's assets. The selection of the optimal defense maximizes resistance to attacks while ensuring the application remains usable by constraining the overhead introduced by protections. The game is solved through a heuristic based on a mini-max depth-first exploration strategy, augmented with dynamic programming optimizations for improved efficiency. Central to our formulation is the introduction of the Software Protection Index, an original contribution that extends existing notions of potency and resilience by evaluating protection effectiveness against attack paths using software metrics and expert assessments. We validate our approach through a proof-of-concept implementation and expert evaluations, demonstrating that automated software protection is a practical and effective solution for risk mitigation in software.
Empirical assessment of the code comprehension effort needed to attack programs protected with obfuscation / Regano, L.; Canavese, D.; Basile, C.; Torchiano, M.. - In: COMPUTERS & SECURITY. - ISSN 0167-4048. - ELETTRONICO. - 166:(2026). [10.1016/j.cose.2026.104881]
Empirical assessment of the code comprehension effort needed to attack programs protected with obfuscation
Regano L.;Canavese D.;Basile C.;Torchiano M.
2026
Abstract
This paper introduces a novel approach for the automated selection of software protections to mitigate \acrlong{mate} risks against critical assets within software applications. We formalize the key elements involved in protection decision-making --- including code artifacts, assets, security requirements, attacks, and software protections --- and frame the protection process through a model inspired by game theory. In this model, a defender strategically applies protections to various code artifacts of a target application, anticipating repeated attack attempts by adversaries against the confidentiality and integrity of the application's assets. The selection of the optimal defense maximizes resistance to attacks while ensuring the application remains usable by constraining the overhead introduced by protections. The game is solved through a heuristic based on a mini-max depth-first exploration strategy, augmented with dynamic programming optimizations for improved efficiency. Central to our formulation is the introduction of the Software Protection Index, an original contribution that extends existing notions of potency and resilience by evaluating protection effectiveness against attack paths using software metrics and expert assessments. We validate our approach through a proof-of-concept implementation and expert evaluations, demonstrating that automated software protection is a practical and effective solution for risk mitigation in software.| File | Dimensione | Formato | |
|---|---|---|---|
|
1-s2.0-S016740482600057X-main.pdf
accesso aperto
Tipologia:
2a Post-print versione editoriale / Version of Record
Licenza:
Creative commons
Dimensione
4.01 MB
Formato
Adobe PDF
|
4.01 MB | Adobe PDF | Visualizza/Apri |
Pubblicazioni consigliate
I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.
https://hdl.handle.net/11583/3008858
