Capturing the Essence of Practical Obfuscation

作者: J. Todd McDonald

DOI: 10.1007/978-3-642-29166-1_44

关键词:

摘要: In the realm of protecting programs from illegitimate use, obfuscation offers a modicum defense against malicious reverse engineering and tampering. As field study, would benefit unifying framework that has solid theoretical foundation yet provides value in empirical study implementation. The essence (in practice) is best described as measurable loss abstraction. We argue mathematical frameworks such abstract interpretation Boolean algebras may provide an ideal marriage theory practice, providing focused direction for future research.

参考文章(46)
Matias Madou, Bertrand Anckaert, Patrick Moseley, Saumya Debray, Bjorn De Sutter, Koen De Bosschere, Software protection through dynamic code mutation workshop on information security applications. ,vol. 3786, pp. 194- 206 ,(2005) , 10.1007/11604938_15
Benjamin Lynn, Manoj Prabhakaran, Amit Sahai, Positive Results and Techniques for Obfuscation theory and application of cryptographic techniques. pp. 20- 39 ,(2004) , 10.1007/978-3-540-24676-3_2
Mila Dalla Preda, Roberto Giacobazzi, Semantic-based code obfuscation by abstract interpretation international colloquium on automata languages and programming. ,vol. 3580, pp. 1325- 1336 ,(2005) , 10.1007/11523468_107
Anirban Majumdar, Clark Thomborson, Manufacturing opaque predicates in distributed systems for code obfuscation ACSC '06 Proceedings of the 29th Australasian Computer Science Conference - Volume 48. pp. 187- 196 ,(2006)
Mila Dalla Preda, Matias Madou, Koen De Bosschere, Roberto Giacobazzi, Opaque predicates detection by abstract interpretation algebraic methodology and software technology. ,vol. 4019, pp. 81- 95 ,(2006) , 10.1007/11784180_9
Nishanth Chandran, Vipul Goyal, Amit Sahai, New Constructions for UC Secure Computation Using Tamper-Proof Hardware Advances in Cryptology – EUROCRYPT 2008. ,vol. 4965, pp. 545- 562 ,(2008) , 10.1007/978-3-540-78967-3_31
Susan Hohenberger, Guy N. Rothblum, abhi shelat, Vinod Vaikuntanathan, Securely Obfuscating Re-encryption Theory of Cryptography. pp. 233- 252 ,(2007) , 10.1007/978-3-540-70936-7_13
Satoshi Hada, Kouichi Sakurai, A Note on the (Im)possibility of Using Obfuscators to Transform Private-Key Encryption into Public-Key Encryption Advances in Information and Computer Security. pp. 1- 12 ,(2007) , 10.1007/978-3-540-75651-4_1
Ning Ding, Dawu Gu, A general and efficient obfuscation for programs with tamper-proof hardware information security practice and experience. pp. 401- 416 ,(2011) , 10.1007/978-3-642-21031-0_30
Edoardo Charbon, Ilhami Torunoglu, Watermarking Techniques for Electronic Circuit Design Digital Watermarking. ,vol. 2613, pp. 147- 169 ,(2003) , 10.1007/3-540-36617-2_13