Obfuscation is used to protect programs from analysis and reverse engineering. There are theoretically effective and resistant obfuscation methods, but most of them are not implemented in practice yet. The main reasons are large overhead for the execution of obfuscated code and the limitation of application only to a specific class of programs. On the other hand, a large number of obfuscation methods have been developed that are applied in practice. The existing approaches to the assessment of such obfuscation methods are based mainly on the static characteristics of programs. Therefore, the comprehensive (taking into account the dynamic characteristics of programs) justification of their effectiveness and resistance is a relevant task. It ...
Obfuscation is the art of making code hard to reverse engineer and understand. In this paper, we pro...
In this paper we introduce a semantic-based approach for code obfuscation. The aim of code obfusca...
While many obfuscation schemes proposed, none of them satisfy any strong definition of obfuscation. ...
A method is developed for assessing the practical persistence of obfuscating transformations of prog...
Abstract. Trigger-based code (malicious in many cases, but not nec-essarily) only executes when spec...
Symbolic and concolic execution find important applications in a number of security-related program ...
Automatic malware analysis is an essential part of today's computer security practices. Nearly one m...
Abstract—Software obfuscation of programs, with the goal of protecting against attackers having phys...
Control code obfuscation is intended to prevent malicious reverse engineering of software by masking...
How to construct a general program obfuscator?We present a novelapproach to automatically generating...
International audienceControl flow obfuscation techniques can be used to hinder software r...
In recent years code obfuscation has attracted research interest as a promising technique for protec...
Obfuscation is a very common protection against reverse engineering attacks: it modifies a program ...
The purpose of this paper is to introduce a further measurement for software obfuscation, in particu...
While many obfuscation schemes proposed, none of them satisfy any strong definition of obfuscation. ...
Obfuscation is the art of making code hard to reverse engineer and understand. In this paper, we pro...
In this paper we introduce a semantic-based approach for code obfuscation. The aim of code obfusca...
While many obfuscation schemes proposed, none of them satisfy any strong definition of obfuscation. ...
A method is developed for assessing the practical persistence of obfuscating transformations of prog...
Abstract. Trigger-based code (malicious in many cases, but not nec-essarily) only executes when spec...
Symbolic and concolic execution find important applications in a number of security-related program ...
Automatic malware analysis is an essential part of today's computer security practices. Nearly one m...
Abstract—Software obfuscation of programs, with the goal of protecting against attackers having phys...
Control code obfuscation is intended to prevent malicious reverse engineering of software by masking...
How to construct a general program obfuscator?We present a novelapproach to automatically generating...
International audienceControl flow obfuscation techniques can be used to hinder software r...
In recent years code obfuscation has attracted research interest as a promising technique for protec...
Obfuscation is a very common protection against reverse engineering attacks: it modifies a program ...
The purpose of this paper is to introduce a further measurement for software obfuscation, in particu...
While many obfuscation schemes proposed, none of them satisfy any strong definition of obfuscation. ...
Obfuscation is the art of making code hard to reverse engineer and understand. In this paper, we pro...
In this paper we introduce a semantic-based approach for code obfuscation. The aim of code obfusca...
While many obfuscation schemes proposed, none of them satisfy any strong definition of obfuscation. ...