Obfuscating compilers protect a software by obscuring its meaning and impeding the reconstruction of its original source code. The typical concern when defining such compilers is their robustness against reverse engineering and the performance of the produced code. Little work has been done in studying whether the security properties of a program are preserved under obfuscation. In this paper we start addressing this problem: we consider control-flow flattening, a popular obfuscation technique used in industrial compilers, and a specific security policy, namely constant-time. We prove that this obfuscation preserves the policy, i.e., that every program satisfying the policy still does after the transformation
International audienceCode obfuscation is the de facto standard to protect intellectual property whe...
Control code obfuscation is intended to prevent malicious reverse engineering of software by masking...
International audienceA common security recommendation is to reduce the in-memory lifetime of secret...
Obfuscating compilers protect a software by obscuring its meaning and impeding the reconstruction...
Obfuscating compilers protect a software by obscuring its meaning and impeding the reconstruction of...
A software obfuscator is a program O to transform a source program P for protection against maliciou...
Abstract. Protecting a software from unauthorized access is an ever de-manding task. Thus, in this p...
International audienceCode obfuscation is emerging as a key asset in security by obscurity.It aims a...
Piracy is a persistent headache for software companies that try to protect their assets by investing...
Abstract—Modern obfuscation techniques are intended to dis-courage reverse engineering and malicious...
This report addresses de-obfuscation on programs. The targeted obfuscation scheme is the control flo...
International audienceObfuscation is a commonly used technique to protect software from the reverse ...
Software, over the years, has evolved from free code given along with the hardware for free to a val...
With more applications being deployed on embedded platforms, software protection becomes increasingl...
International audienceCode obfuscation is the de facto standard to protect intellectual property whe...
Control code obfuscation is intended to prevent malicious reverse engineering of software by masking...
International audienceA common security recommendation is to reduce the in-memory lifetime of secret...
Obfuscating compilers protect a software by obscuring its meaning and impeding the reconstruction...
Obfuscating compilers protect a software by obscuring its meaning and impeding the reconstruction of...
A software obfuscator is a program O to transform a source program P for protection against maliciou...
Abstract. Protecting a software from unauthorized access is an ever de-manding task. Thus, in this p...
International audienceCode obfuscation is emerging as a key asset in security by obscurity.It aims a...
Piracy is a persistent headache for software companies that try to protect their assets by investing...
Abstract—Modern obfuscation techniques are intended to dis-courage reverse engineering and malicious...
This report addresses de-obfuscation on programs. The targeted obfuscation scheme is the control flo...
International audienceObfuscation is a commonly used technique to protect software from the reverse ...
Software, over the years, has evolved from free code given along with the hardware for free to a val...
With more applications being deployed on embedded platforms, software protection becomes increasingl...
International audienceCode obfuscation is the de facto standard to protect intellectual property whe...
Control code obfuscation is intended to prevent malicious reverse engineering of software by masking...
International audienceA common security recommendation is to reduce the in-memory lifetime of secret...