Assessing the Security Properties of Software Obfuscation

被引:0
|
作者
Xu, Hui [1 ]
Lyu, Michael R. [1 ]
机构
[1] Chinese Univ Hong Kong, Comp Sci & Engn Dept, Hong Kong, Hong Kong, Peoples R China
基金
中国国家自然科学基金;
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
引用
收藏
页码:80 / 83
页数:4
相关论文
共 50 条
  • [21] Security Analysis of Logic Obfuscation
    Rajendran, Jeyavijayan
    Pino, Youngok
    Sinanoglu, Ozgur
    Karri, Ramesh
    2012 49TH ACM/EDAC/IEEE DESIGN AUTOMATION CONFERENCE (DAC), 2012, : 83 - 89
  • [22] Assessing the Usability of End-User Security Software
    Ibrahim, Tarik
    Furnell, Steven M.
    Papadaki, Maria
    Clarke, Nathan L.
    TRUST, PRIVACY AND SECURITY IN DIGITAL BUSINESS, 2010, 6264 : 177 - 189
  • [23] Assessing Security Risks of Software Supply Chains Using Software Bill of Materials
    O'Donoghue, Eric
    Reinhold, Ann Marie
    Izurieta, Clemente
    2024 IEEE INTERNATIONAL CONFERENCE ON SOFTWARE ANALYSIS, EVOLUTION AND REENGINEERING-COMPANION, SANER-C 2024, 2024, : 134 - 140
  • [24] Properties for Security Measures of Software Products
    Liu, Yanguo Michael
    Traore, Issa
    APPLIED MATHEMATICS & INFORMATION SCIENCES, 2007, 1 (02): : 129 - 156
  • [25] Indistinguishability Obfuscation from Circular Security
    Gay, Romain
    Pass, Rafael
    STOC '21: PROCEEDINGS OF THE 53RD ANNUAL ACM SIGACT SYMPOSIUM ON THEORY OF COMPUTING, 2021, : 736 - 749
  • [26] Applications of homomorphic functions to software obfuscation
    Zhu, William
    Thomborson, Clark
    Wang, Fei-Yue
    INTELLIGENCE AND SECURITY INFORMATICS, PROCEEDINGS, 2006, 3917 : 152 - 153
  • [27] Security Analysis of Scan Obfuscation Techniques
    Sao, Yogendra
    Ali, Sk. Subidh
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2023, 18 : 2842 - 2855
  • [28] Algorithmic Information Theory for Obfuscation Security
    Mohsen, Rabih
    Pinto, Alexandre Miranda
    2015 12TH INTERNATIONAL JOINT CONFERENCE ON E-BUSINESS AND TELECOMMUNICATIONS (ICETE), VOL 4, 2015, : 76 - 87
  • [29] A Dynamic Obfuscation Framework for Security and Utility
    Wintenberg, Andrew
    Blischke, Matthew
    Lafortune, Stephane
    Ozay, Necmiye
    2022 13TH ACM/IEEE INTERNATIONAL CONFERENCE ON CYBER-PHYSICAL SYSTEMS (ICCPS 2022), 2022, : 236 - 246
  • [30] A Security Analysis of Circuit Clock Obfuscation
    Datta, Rajesh
    Zhao, Guangwei
    Basu, Kanad
    Shamsi, Kaveh
    CRYPTOGRAPHY, 2022, 6 (03)