In this paper we introduce a semantic-based approach for code obfuscation. The aim of code obfuscation is to prevent malicious users to disclose properties of the original source program. This goal can be precisely modeled by abstract interpretation, where the hiding of properties corresponds to abstract the semantics. We derive a general theory based on abstract interpretation, where the potency of code obfuscation can be measured by comparing hidden properties in the lattice of abstract interpretations. Semantic-based code obfuscation is applied to show that well known program transformation methods, such as constant propagation, can be seen as code obfuscation
The paper presents an obfuscation problem, in which indistinguishability is considered relatively to...
Symbolic and concolic execution find important applications in a number of security-related program ...
Abstract. An obfuscation aims to transform a program, without affect-ing the functionality, so that ...
In recent years code obfuscation has attracted research interest as a promising technique for protec...
Control code obfuscation is intended to prevent malicious reverse engineering of software by masking...
In this extended abstract we survey the most recent developments in code obfuscation and protection ...
Obfuscation is the art of making code hard to reverse engineer and understand. In this paper, we pro...
Recent studies on code protection showed that incompleteness, in the abstract interpretation framewo...
Hiding information means both hiding as making it imperceptible and obscuring as making it incompreh...
How to construct a general program obfuscator?We present a novelapproach to automatically generating...
Code protection technologies require anti reverse engineering transformations to obfuscate programs ...
We study the existence and the characterization of function transformers that minimally or maximally...
n recent years, code obfuscation has attracted both researchers and software developers as a useful ...
Code protection technologies require anti reverse engineering transformations to obfuscate programs ...
Code protection technologies require anti reverse engineering transformations to obfuscate programs ...
The paper presents an obfuscation problem, in which indistinguishability is considered relatively to...
Symbolic and concolic execution find important applications in a number of security-related program ...
Abstract. An obfuscation aims to transform a program, without affect-ing the functionality, so that ...
In recent years code obfuscation has attracted research interest as a promising technique for protec...
Control code obfuscation is intended to prevent malicious reverse engineering of software by masking...
In this extended abstract we survey the most recent developments in code obfuscation and protection ...
Obfuscation is the art of making code hard to reverse engineer and understand. In this paper, we pro...
Recent studies on code protection showed that incompleteness, in the abstract interpretation framewo...
Hiding information means both hiding as making it imperceptible and obscuring as making it incompreh...
How to construct a general program obfuscator?We present a novelapproach to automatically generating...
Code protection technologies require anti reverse engineering transformations to obfuscate programs ...
We study the existence and the characterization of function transformers that minimally or maximally...
n recent years, code obfuscation has attracted both researchers and software developers as a useful ...
Code protection technologies require anti reverse engineering transformations to obfuscate programs ...
Code protection technologies require anti reverse engineering transformations to obfuscate programs ...
The paper presents an obfuscation problem, in which indistinguishability is considered relatively to...
Symbolic and concolic execution find important applications in a number of security-related program ...
Abstract. An obfuscation aims to transform a program, without affect-ing the functionality, so that ...