Methods and Software for the Program Obfuscation

被引:2
|
作者
Shevtsova, O. O. [1 ]
Buintsev, D. N. [1 ]
机构
[1] TUSUR, KIBEVS Dept, Tomsk 634050, Russia
关键词
Obfuscation theory; software protection;
D O I
10.1109/SIBCON.2009.5044838
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
On the basis of analysis of the obfuscation transformations the most rational set is given for automation of the obfuscation process. Design of Delphi software for automating obfuscation is proposed and described.
引用
收藏
页码:113 / 115
页数:3
相关论文
共 50 条
  • [1] Hiding Secrets in Software: A Cryptographic Approach to Program Obfuscation
    Garg, Sanjam
    Gentry, Craig
    Halevi, Shai
    Raykova, Mariana
    Sahai, Amit
    Waters, Brent
    [J]. COMMUNICATIONS OF THE ACM, 2016, 59 (05) : 113 - 120
  • [2] Three control flow obfuscation methods for Java']Java software
    Hou, T. W.
    Chen, H. Y.
    Tsai, M. H.
    [J]. IEE PROCEEDINGS-SOFTWARE, 2006, 153 (02): : 80 - 86
  • [3] A Tutorial on Software Obfuscation
    Banescu, Sebastian
    Pretschner, Alexander
    [J]. ADVANCES IN COMPUTERS, VOL 108, 2018, 108 : 283 - 353
  • [4] A Breakthrough in Software Obfuscation
    Barak, Boaz
    [J]. COMMUNICATIONS OF THE ACM, 2016, 59 (05) : 112 - 112
  • [5] Incremental Program Obfuscation
    Garg, Sanjam
    Pandey, Omkant
    [J]. ADVANCES IN CRYPTOLOGY - CRYPTO 2017, PART II, 2017, 10402 : 193 - 223
  • [6] Forensic and Software (UN) Obfuscation
    Desnos, Anthony
    Vanderbeken, Eloi
    [J]. PROCEEDINGS OF THE 9TH EUROPEAN CONFERENCE ON INFORMATION WARFARE AND SECURITY, 2010, : 416 - 430
  • [7] Layered obfuscation: a taxonomy of software obfuscation techniques for layered security
    Hui Xu
    Yangfan Zhou
    Jiang Ming
    Michael Lyu
    [J]. Cybersecurity, 3
  • [8] Hopes, Fears, and Software Obfuscation
    Barak, Boaz
    [J]. COMMUNICATIONS OF THE ACM, 2016, 59 (03) : 88 - 96
  • [9] Layered obfuscation: a taxonomy of software obfuscation techniques for layered security
    Xu, Hui
    Zhou, Yangfan
    Ming, Jiang
    Lyu, Michael
    [J]. CYBERSECURITY, 2020, 3 (01)
  • [10] Program obfuscation by strong cryptography
    Vrba, Zeljko
    Halvorsen, Pal
    Griwodz, Carsten
    [J]. FIFTH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY, AND SECURITY: ARES 2010, PROCEEDINGS, 2010, : 242 - 247