The quality of obfuscation and obfuscation techniques

被引:1
|
作者
Witkowska, Joanna [1 ]
机构
[1] Univ Finance & Management Bialystok, Branch Elk, Fac Engn, PL-19300 Elk, Poland
关键词
D O I
10.1007/978-0-387-36503-9_16
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
This paper aims an overview of the obfuscation transformations like layout, data, control, preventative and stealthy obfuscation. Software obfuscation is the common way to prevent reverse engineering. Obfuscation is one of the software secrets technique protections and in general, describes a practice that is used intentionally to make something more difficult to understand. Obfuscation techniques convert program into another one with the same behavior that is more difficult to understand. Obfuscation cannot be mathematical analyze and it is very hard to predict the effectiveness of obfuscation transformations.
引用
收藏
页码:175 / 182
页数:8
相关论文
共 50 条
  • [21] On the Limitations of Query Obfuscation Techniques for Location Privacy
    Peddinti, Sai Teja
    Saxena, Nitesh
    UBICOMP'11: PROCEEDINGS OF THE 2011 ACM INTERNATIONAL CONFERENCE ON UBIQUITOUS COMPUTING, 2011, : 187 - 196
  • [22] On the Effectiveness of Obfuscation Techniques in Online Social Networks
    Chen, Terence
    Boreli, Roksana
    Kaafar, Mohamed-Ali
    Friedman, Arik
    PRIVACY ENHANCING TECHNOLOGIES, PETS 2014, 2014, 8555 : 42 - 62
  • [23] An Overview of FPGA-inspired Obfuscation Techniques
    Ul Abideen, Zain
    Gokulanathan, Sumathi
    Aljafar, Muayad j.
    Pagliarini, Samuel
    ACM COMPUTING SURVEYS, 2024, 56 (12)
  • [24] Obfuscation from Polynomial Hardness: Beyond Decomposable Obfuscation
    Kang, Yuan
    Lin, Chengyu
    Malkin, Tal
    Raykova, Mariana
    SECURITY AND CRYPTOGRAPHY FOR NETWORKS, SCN 2018, 2018, 11035 : 407 - 424
  • [25] A Framework to Quantify the Quality of Source Code Obfuscation
    Jin, Hongjoo
    Lee, Jiwon
    Yang, Sumin
    Kim, Kijoong
    Lee, Dong Hoon
    APPLIED SCIENCES-BASEL, 2024, 14 (12):
  • [26] BUREAUCRATIC OBFUSCATION
    不详
    NATION, 1970, 211 (20) : 612 - 612
  • [27] Obfuscation in Oz
    Mining Magazine, 1991, 165 (04):
  • [28] DANGEROUS OBFUSCATION
    CLAIBORNE, R
    NATION, 1982, 234 (12) : 354 - 354
  • [29] A masterpiece of obfuscation
    Doerr, E
    PHI DELTA KAPPAN, 2004, 86 (01) : 96 - 96
  • [30] Translingual Obfuscation
    Wang, Pei
    Wang, Shuai
    Ming, Jiang
    Jiang, Yufei
    Wu, Dinghao
    1ST IEEE EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY, 2016, : 128 - 144