KOR

e-Article

Identifying Code Tampering Using A Bytecode Comparison Analysis Tool
Document Type
Conference
Source
2023 IEEE/ACIS 21st International Conference on Software Engineering Research, Management and Applications (SERA) Software Engineering Research, Management and Applications (SERA), 2023 IEEE/ACIS 21st International Conference on. :69-76 May, 2023
Subject
Communication, Networking and Broadcast Technologies
Components, Circuits, Devices and Systems
Computing and Processing
Robotics and Control Systems
Signal Processing and Analysis
Java
Codes
Supply chains
Software
Security
Software engineering
SolarWinds
SootDiff
Jimple
bytecode
software supply chain
software supply chain security
Language
ISSN
2770-8209
Abstract
The issues related to SolarWinds attacks point out a large concern with modern software development projects in that there are fundamental flaws with existing security infrastructure. The purpose of this research is to investigate to what extent can the SootDiff analysis tool, a bytecode comparison tool, be used to determine if an application has been tampered with by comparing a known good version with a version that is unknown. The compiled and decompiled bytecodes as Jimple representations were compared to analyze the unique differences in identifying code tempering. The results showed that the scope of the variable is important in whether the change was detected. Variables with a scope that was entirely contained within one method could have their names changed without triggering a warning, but global variables to objects could not. The parameter variable and the local variable behave differently. Since the parameter is in the publicly available part of the method Java treats it the same way as it does the global variable. The local variable is strictly private to the method and not made available to the outside. Such findings can support the analysis tool which is useful for identifying potential breaches to detect meaningful changes in code even if it is decompiled.