The quality of obfuscation and obfuscation techniques

被引:1
|
作者
Witkowska, Joanna [1 ]
机构
[1] Univ Finance & Management Bialystok, Branch Elk, Fac Engn, PL-19300 Elk, Poland
关键词
D O I
10.1007/978-0-387-36503-9_16
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
This paper aims an overview of the obfuscation transformations like layout, data, control, preventative and stealthy obfuscation. Software obfuscation is the common way to prevent reverse engineering. Obfuscation is one of the software secrets technique protections and in general, describes a practice that is used intentionally to make something more difficult to understand. Obfuscation techniques convert program into another one with the same behavior that is more difficult to understand. Obfuscation cannot be mathematical analyze and it is very hard to predict the effectiveness of obfuscation transformations.
引用
收藏
页码:175 / 182
页数:8
相关论文
共 50 条
  • [1] Layered obfuscation: a taxonomy of software obfuscation techniques for layered security
    Hui Xu
    Yangfan Zhou
    Jiang Ming
    Michael Lyu
    Cybersecurity, 3
  • [2] Layered obfuscation: a taxonomy of software obfuscation techniques for layered security
    Xu, Hui
    Zhou, Yangfan
    Ming, Jiang
    Lyu, Michael
    CYBERSECURITY, 2020, 3 (01)
  • [3] Evaluation of Hardware Obfuscation Techniques using Obfuscation Tool oLLVM
    Matsuoka Y.
    Fujieda N.
    Ichikawa S.
    IEEJ Transactions on Industry Applications, 2019, 139 (02): : 111 - 118
  • [4] Positive results and techniques for obfuscation
    Lynn, B
    Prabhakaran, M
    Sahai, A
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2004, PROCEEDINGS, 2004, 3027 : 20 - 39
  • [5] Eavesdropping and Obfuscation Techniques for Smartphones
    Chakraborty, Supriyo
    Tripp, Omer
    2016 IEEE/ACM INTERNATIONAL CONFERENCE ON MOBILE SOFTWARE ENGINEERING AND SYSTEMS (MOBILESOFT 2016), 2016, : 291 - 292
  • [6] Assessment of Source Code Obfuscation Techniques
    Viticchie, Alessio
    Regano, Leonardo
    Torchiano, Marco
    Basile, Cataldo
    Ceccato, Mariano
    Tonella, Paolo
    Tiella, Roberto
    2016 IEEE 16TH INTERNATIONAL WORKING CONFERENCE ON SOURCE CODE ANALYSIS AND MANIPULATION (SCAM), 2016, : 11 - 20
  • [7] A survey on Java program obfuscation techniques
    School of Software, Tsinghua University, Beijing 100084, China
    不详
    不详
    不详
    Jisuanji Xuebao, 9 (1578-1588):
  • [8] Attacks on Logic Locking Obfuscation Techniques
    Mellor, Jake
    Shelton, Allen
    Yue, Michael
    Tehranipoor, Fatemeh
    2021 IEEE INTERNATIONAL CONFERENCE ON CONSUMER ELECTRONICS (ICCE), 2021,
  • [9] Digital evidence obfuscation: Recovery techniques
    Craiger, JP
    Swauger, J
    Marberry, C
    Sensors, and Command, Control, Communications, and Intelligence (C31) Technologies for Homeland Security and Homeland Defense IV, Pts 1 and 2, 2005, 5778 : 587 - 594
  • [10] Security Analysis of Scan Obfuscation Techniques
    Sao, Yogendra
    Ali, Sk. Subidh
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2023, 18 : 2842 - 2855