Initial Analysis of Underhanded Source Code

April, 2020
IDA document: D-13166
FFRDC: Systems and Analyses Center
Type: Documents
Division: Information Technology and Systems Division
David A. Wheeler See more authors
Underhanded source code appears benign but is actually malicious. This paper identifies and summarizes public examples of underhanded code, briefly summarizes the literature, and identifies promising countermeasures. It then measures the effectiveness of a small set of countermeasures on the Obfuscated V Contest data set.