##plugins.themes.bootstrap3.article.main##

Mohammed Hassan bin-Shamlan Nabil Munassar Mohammed Fadhl Abdullah

Abstract

Reverse engineering has been a major challenging factor in software security since unauthorized analysis and manipulation of applications are made possible. This paper introduces a novel hybrid obfuscation technique intended to enhance the security of software against all such threats by means of a combined application of control flow and data obfuscation techniques. Our methodology systematically transforms software code to increase the complexity and obscure the functionality of code such that reverse engineering becomes challenging. This was developed in a prototype tool authored in C# and tested on the various metrics associated with execution time, code size, and resistance to decompilation. Results indicate that our hybrid technique achieves only a modest increase in execution time, in the order of up to 13%, but it makes a significant contribution to security as indicated by increases in cyclomatic complexity and reduced clarity regarding static analysis. Also, our technique demonstrates superiority over existing tools since, while incorporating a greater level of obfuscation complexity, it maintains fewer lines of code. This research elucidates the importance of hybrid obfuscation strategies for the protection of software against increasingly advanced reverse engineering techniques.

##plugins.themes.bootstrap3.article.details##

Keywords

Control Flow, Obfuscation, Reverse Engineering, Cyclomatic Complexity

Section
Basic Siences
How to Cite
[1]
bin-Shamlan , M.H. et al. trans. 2026. Hybrid Obfuscation Technique to Enhance Software Protection Against Reverse Engineering. Journal of Science and Technology. 31, 1 (Feb. 2026). DOI:https://doi.org/10.20428/jst.v31i1.3231.

How to Cite

[1]
bin-Shamlan , M.H. et al. trans. 2026. Hybrid Obfuscation Technique to Enhance Software Protection Against Reverse Engineering. Journal of Science and Technology. 31, 1 (Feb. 2026). DOI:https://doi.org/10.20428/jst.v31i1.3231.

Most read articles by the same author(s)

1 2 > >>