On the concept of software obfuscation in computer security

被引:0
|
作者
Kuzurin, Nikolay [1 ]
Shokurov, Alexander [1 ]
Varnovsky, Nikolay [2 ]
Zakharov, Vladimir [2 ]
机构
[1] Inst Syst Programming, Moscow, Russia
[2] Moscow MV Lomonosov State Univ, Moscow, Russia
来源
关键词
program obfuscation; security; Turing machine; encryption;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Program obfuscation is a semantic-preserving transformation aimed at bringing a program into such a form, which impedes the understanding of its algorithm and data structures or prevents extracting of some valuable information from the text of a program. Since obfuscation could find wide use in computer security, information hiding and cryptography, security requirements to program obfuscators became a major focus of interests for pioneers of theory of software obfuscation. In this paper we also address the issue of defining security of program obfuscation. We argue that requirements to obfuscation may be different and dependent on potential applications. Therefore, it makes sense to deal with a broad spectrum of security definitions for program obfuscation. In this paper we analyze five models for studying various aspects of obfuscation: "black box" model of total obfuscation, "grey box" model of total obfuscation, obfuscation for software protection, constant hiding, and predicate obfuscation. For each of these models we consider the applications where the model may be valid, positive and negative results on the existence of secure obfuscation in the framework of the model, and relationships with other models of program obfuscation.
引用
收藏
页码:281 / +
页数:4
相关论文
共 50 条
  • [1] Layered obfuscation: a taxonomy of software obfuscation techniques for layered security
    Hui Xu
    Yangfan Zhou
    Jiang Ming
    Michael Lyu
    [J]. Cybersecurity, 3
  • [2] Novel obfuscation algorithms for software security
    Ertaul, L
    Venkatesh, S
    [J]. SERP '05: PROCEEDINGS OF THE 2005 INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING RESEARCH AND PRACTICE, VOLS 1 AND 2, 2005, : 209 - 215
  • [3] Layered obfuscation: a taxonomy of software obfuscation techniques for layered security
    Xu, Hui
    Zhou, Yangfan
    Ming, Jiang
    Lyu, Michael
    [J]. CYBERSECURITY, 2020, 3 (01)
  • [4] Assessing the Security Properties of Software Obfuscation
    Xu, Hui
    Lyu, Michael R.
    [J]. IEEE SECURITY & PRIVACY, 2016, 14 (05) : 80 - 83
  • [5] Stealthy Code Obfuscation Technique for Software Security
    Darwish, Saad M.
    Guirguis, Shawkat K.
    Zalat, Mohamed S.
    [J]. ICCES'2010: THE 2010 INTERNATIONAL CONFERENCE ON COMPUTER ENGINEERING & SYSTEMS, 2010, : 93 - 99
  • [6] A Survey on Aims and Environments of Diversification and Obfuscation in Software Security
    Hosseinzadeh, Shohreh
    Rauti, Sampsa
    Lauren, Samuel
    Makela, Jari-Matti
    Holvitie, Johannes
    Hyrynsalmi, Sami
    Leppanen, Ville
    [J]. COMPUTER SYSTEMS AND TECHNOLOGIES, COMPSYSTECH'16, 2016, : 113 - 120
  • [7] Function Level Control Flow Obfuscation for Software Security
    Balachandran, Vivek
    Keong, Ng Wee
    Emmanuel, Sabu
    [J]. 2014 EIGHTH INTERNATIONAL CONFERENCE ON COMPLEX, INTELLIGENT AND SOFTWARE INTENSIVE SYSTEMS (CISIS),, 2014, : 133 - 140
  • [8] Diversification and obfuscation techniques for software security: A systematic literature review
    Hosseinzadeh, Shohreh
    Rauti, Sampsa
    Lauren, Samuel
    Makela, Jari-Matti
    Holvitie, Johannes
    Hyrynsalmi, Sami
    Leppanen, Ville
    [J]. INFORMATION AND SOFTWARE TECHNOLOGY, 2018, 104 : 72 - 93
  • [9] A Security Model and Implementation of Embedded Software Based on Code Obfuscation
    Yi, Jiajia
    Chen, Lirong
    Zhang, Haitao
    Li, Yun
    Zhao, Huanyu
    [J]. 2020 IEEE 19TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2020), 2020, : 1606 - 1613
  • [10] A Method for Computer Software Security Detection
    Yong, Cheng
    Ling, Yang
    Jin Wenjia
    Yang Wenzhong
    Wang Wei
    Wang Feng
    Zhou Yong
    [J]. MEMS, NANO AND SMART SYSTEMS, PTS 1-6, 2012, 403-408 : 2981 - +