TITLE

program obfuscator

PUB. DATE
October 2011
SOURCE
Computer Desktop Encyclopedia;10/1/2011, p1
SOURCE TYPE
Encyclopedia
DOC. TYPE
Reference Entry
ABSTRACT
See obfuscator.
ACCESSION #
34821456

 

Related Articles

  • On Best-Possible Obfuscation. Goldwasser, Shafi; Rothblum, Guy // Journal of Cryptology;Summer2014, Vol. 27 Issue 3, p480 

    An obfuscator is a compiler that transforms any program (which we will view in this work as a boolean circuit) into an obfuscated program (also a circuit) that has the same input-output functionality as the original program, but is 'unintelligible'. Obfuscation has applications for cryptography...

  • program obfuscator.  // Computer Desktop Encyclopedia;2015, p1 

    See obfuscator.

  • Experiment with control code obfuscation. Song Ya-qi; Li Li // Journal of Communication & Computer;Aug2007, Vol. 4 Issue 8, p59 

    Control code obfuscation is intended to prevent malicious reverse engineering of software by masking the program control flow. The idea for further advancing the state of the art was presented in 2000 by WANG C. An obfuscating system for Java based on the ideas of WANG C is implemented and...

  • Neatness Counts. Schneider, David // American Scientist;May/Jun2007, Vol. 95 Issue 3, p213 

    The article focuses on code obfuscation, the practice of making computer codes less readable. The motivation for code obfuscation grows from a fundamental change that has taken place in the way many programs are distributed. Sebastian Holst of PreEmptive Solutions, an Ohio company that sells...

  • A CONTROL FLOW OBFUSCATION SCHEME BASED ON GARBAGE CODE. YONGYONG SUN; GUANGQIU HUANG // Journal of Theoretical & Applied Information Technology;12/15/2012, Vol. 46 Issue 1, p284 

    Control flow obfuscation is used to obfuscate program execution flow, thus preventing reverse engineering of software. However, the code size and execution time will be increased greatly after program is obfuscated. Since opaque predicate is difficult to resist the dynamic attack, the paper...

  • On Strong Simulation and Composable Point Obfuscation. Bitansky, Nir; Canetti, Ran // Journal of Cryptology;Spring2014, Vol. 27 Issue 2, p317 

    The Virtual Black Box (VBB) property for program obfuscators provides a strong guarantee: anything computable by an efficient adversary, given the obfuscated program, can also be computed by an efficient simulator, with only oracle access to the program. However, we know how to achieve this...

  • Method of Software Obfuscation Using Petri Nets. Dunaev, Dmitriy; Lengyel, László // Central European Conference on Information & Intelligent Systems;Sep2013, p242 

    Obfuscation, in general, is a technique that is used to intentionally make a program code harder to read and analyze for privacy or security purposes. To counteract reverse engineering and unauthorized program analysis, we have to consider obfuscation of a control flow graph since it describes...

  • Maximal incompleteness as obfuscation potency. Giacobazzi, Roberto; Mastroeni, Isabella; Dalla Preda, Mila // Formal Aspects of Computing;Jan2017, Vol. 29 Issue 1, p3 

    Obfuscation is the art of making code hard to reverse engineer and understand. In this paper, we propose a formal model for specifying and understanding the strength of obfuscating transformations with respect to a given attack model. The idea is to consider the attacker as an abstract...

  • Polymorphic inline code obfuscation algorithm. Shao Mengliang; Qi Deyu; Liu Dongwen // Application Research of Computers / Jisuanji Yingyong Yanjiu;Jun2015, Vol. 32 Issue 6, p1787 

    Aiming at the existence of the monomorphism of output result in the inlining method of code obfuscation algorithm, this paper proposed a kind of polymorphic inline code obfuscation algorithm. Based on finite state automaton (FSM), it established the theorical model of algorithm which for each...

Share

Read the Article

Courtesy of THE LIBRARY OF VIRGINIA

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics