On the concept of software obfuscation in computer security

被引:0
|
作者
Kuzurin, Nikolay [1 ]
Shokurov, Alexander [1 ]
Varnovsky, Nikolay [2 ]
Zakharov, Vladimir [2 ]
机构
[1] Inst Syst Programming, Moscow, Russia
[2] Moscow MV Lomonosov State Univ, Moscow, Russia
来源
关键词
program obfuscation; security; Turing machine; encryption;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Program obfuscation is a semantic-preserving transformation aimed at bringing a program into such a form, which impedes the understanding of its algorithm and data structures or prevents extracting of some valuable information from the text of a program. Since obfuscation could find wide use in computer security, information hiding and cryptography, security requirements to program obfuscators became a major focus of interests for pioneers of theory of software obfuscation. In this paper we also address the issue of defining security of program obfuscation. We argue that requirements to obfuscation may be different and dependent on potential applications. Therefore, it makes sense to deal with a broad spectrum of security definitions for program obfuscation. In this paper we analyze five models for studying various aspects of obfuscation: "black box" model of total obfuscation, "grey box" model of total obfuscation, obfuscation for software protection, constant hiding, and predicate obfuscation. For each of these models we consider the applications where the model may be valid, positive and negative results on the existence of secure obfuscation in the framework of the model, and relationships with other models of program obfuscation.
引用
收藏
页码:281 / +
页数:4
相关论文
共 50 条
  • [21] Hopes, Fears, and Software Obfuscation
    Barak, Boaz
    COMMUNICATIONS OF THE ACM, 2016, 59 (03) : 88 - 96
  • [22] Better Security Through Obfuscation
    不详
    COMMUNICATIONS OF THE ACM, 2021, 64 (08) : 13 - 14
  • [23] Methods and Software for the Program Obfuscation
    Shevtsova, O. O.
    Buintsev, D. N.
    SIBCON-2009: INTERNATIONAL SIBERIAN CONFERENCE ON CONTROL AND COMMUNICATIONS, 2009, : 113 - 115
  • [24] Security Analysis of Logic Obfuscation
    Rajendran, Jeyavijayan
    Pino, Youngok
    Sinanoglu, Ozgur
    Karri, Ramesh
    2012 49TH ACM/EDAC/IEEE DESIGN AUTOMATION CONFERENCE (DAC), 2012, : 83 - 89
  • [25] Q-Learning: From Computer Network Security To Software Security
    Randrianasolo, Arisoa S.
    Pyeatt, Larry D.
    2014 13TH INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND APPLICATIONS (ICMLA), 2014, : 257 - 262
  • [26] Software Security Knowledge Transferring and Learning with Concept Maps
    Wen, Shao-Fang
    2018 2ND INTERNATIONAL CONFERENCE ON E-SOCIETY, E-EDUCATION AND E-TECHNOLOGY (ICSET 2018), 2018, : 51 - 55
  • [27] Creating a computer security curriculum in a software engineering program
    Rubin, Bradley S.
    Misra, Bhabani S.
    ICSE 2007: 29th International Conference on Software Engineering, Proceedings, 2007, : 732 - 735
  • [28] Evaluation and selection of security products for authentication of computer software
    Roenigk, MW
    OPTICAL SECURITY AND COUNTERFEIT DETERRENCE TECHNIQUES III, 2000, 3973 : 62 - 65
  • [29] Indistinguishability Obfuscation from Circular Security
    Gay, Romain
    Pass, Rafael
    STOC '21: PROCEEDINGS OF THE 53RD ANNUAL ACM SIGACT SYMPOSIUM ON THEORY OF COMPUTING, 2021, : 736 - 749
  • [30] Applications of homomorphic functions to software obfuscation
    Zhu, William
    Thomborson, Clark
    Wang, Fei-Yue
    INTELLIGENCE AND SECURITY INFORMATICS, PROCEEDINGS, 2006, 3917 : 152 - 153