Methods and Software for the Program Obfuscation

被引:2
|
作者
Shevtsova, O. O. [1 ]
Buintsev, D. N. [1 ]
机构
[1] TUSUR, KIBEVS Dept, Tomsk 634050, Russia
关键词
Obfuscation theory; software protection;
D O I
10.1109/SIBCON.2009.5044838
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
On the basis of analysis of the obfuscation transformations the most rational set is given for automation of the obfuscation process. Design of Delphi software for automating obfuscation is proposed and described.
引用
收藏
页码:113 / 115
页数:3
相关论文
共 50 条
  • [21] Deviation-Based Obfuscation-Resilient Program Equivalence Checking With Application to Software Plagiarism Detection
    Ming, Jiang
    Zhang, Fangfang
    Wu, Dinghao
    Liu, Peng
    Zhu, Sencun
    [J]. IEEE TRANSACTIONS ON RELIABILITY, 2016, 65 (04) : 1647 - 1664
  • [22] A survey on Java program obfuscation techniques
    School of Software, Tsinghua University, Beijing 100084, China
    不详
    不详
    不详
    [J]. Jisuanji Xuebao, 9 (1578-1588):
  • [23] Leakage Resilience from Program Obfuscation
    Dana Dachman-Soled
    S. Dov Gordon
    Feng-Hao Liu
    Adam O’Neill
    Hong-Sheng Zhou
    [J]. Journal of Cryptology, 2019, 32 : 742 - 824
  • [24] Towards Formal Verification of Program Obfuscation
    Lu, Weiyun
    Sistany, Bahman
    Felty, Amy
    Scott, Philip
    [J]. 2020 IEEE EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY WORKSHOPS (EUROS&PW 2020), 2020, : 635 - 644
  • [25] Program Obfuscation via ABI Debiasing
    Demicco, David
    Erinfolami, Rukayat
    Prakash, Aravind
    [J]. 37TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, ACSAC 2021, 2021, : 146 - 157
  • [26] Leakage Resilience from Program Obfuscation
    Dachman-Soled, Dana
    Gordon, S. Dov
    Liu, Feng-Hao
    O'Neill, Adam
    Zhou, Hong-Sheng
    [J]. JOURNAL OF CRYPTOLOGY, 2019, 32 (03) : 742 - 824
  • [27] Stealthy Code Obfuscation Technique for Software Security
    Darwish, Saad M.
    Guirguis, Shawkat K.
    Zalat, Mohamed S.
    [J]. ICCES'2010: THE 2010 INTERNATIONAL CONFERENCE ON COMPUTER ENGINEERING & SYSTEMS, 2010, : 93 - 99
  • [28] The performance cost of software obfuscation for Android applications
    Zhuang, Yan
    [J]. COMPUTERS & SECURITY, 2018, 73 : 57 - 72
  • [29] On the Impact of Code Obfuscation to Software Energy Consumption
    Bunse, Christian
    [J]. FROM SCIENCE TO SOCIETY: NEW TRENDS IN ENVIRONMENTAL INFORMATICS, 2018, : 239 - 249
  • [30] A Smart Obfuscation Approach to Protect Software in Cloud
    Yu, Lei
    Duan, Yucong
    [J]. CMC-COMPUTERS MATERIALS & CONTINUA, 2023, 76 (03): : 3949 - 3965