Abstract
Code obfuscation has become an essential practice in modern software development, designed to make source or machine code challenging for both humans and computers to comprehend. It plays a crucial role in cybersecurity by protecting intellectual property, safeguarding trade secrets, and preventing unauthorized access or reverse engineering. However, the lack of transparency in obfuscated code raises significant ethical concerns, including the potential for harmful or unethical uses such as hidden data collection, malicious features, back doors, and concealed vulnerabilities. These issues highlight the need for a balanced approach that ensures the protection of developers’ intellectual property while addressing ethical responsibilities related to user privacy, transparency, and societal impact. This paper investigates various code obfuscation techniques, their benefits, challenges, and practical applications, underscoring their relevance in contemporary software development. This study examines obfuscation methods and tools, evaluates machine learning models—including Random Forest, Gradient Boosting, and Support Vector Machine—and presents experimental results aimed at classifying obfuscated versus non-obfuscated files. Our findings demonstrate that these models achieve high accuracy in identifying obfuscation methods employed by tools such as Jlaive, Oxyry, PyObfuscate, Pyarmor, and py-obfuscator. This research also addresses emerging ethical concerns and proposes guidelines for a balanced, responsible approach to code obfuscation.
Original language | English |
---|---|
Article number | 54 |
Journal | Algorithms |
Volume | 18 |
Issue number | 2 |
DOIs | |
State | Published - 1 Feb 2025 |
Keywords
- classification of obfuscation
- code obfuscation
- cybersecurity
- ethical challenges
- ethical responsibilities
- obfuscation tools
ASJC Scopus subject areas
- Theoretical Computer Science
- Numerical Analysis
- Computational Theory and Mathematics
- Computational Mathematics