메뉴 건너뛰기




Volumn E86-A, Issue 1, 2003, Pages 176-186

Software obfuscation on a theoretical basis and its implementation

Author keywords

Computational complexity; Obfuscation; Static analysis; Tamper resistant software

Indexed keywords

COMPUTATIONAL COMPLEXITY; COMPUTER SOFTWARE; INTELLECTUAL PROPERTY; PROBLEM SOLVING;

EID: 0041475743     PISSN: 09168508     EISSN: None     Source Type: Journal    
DOI: None     Document Type: Conference Paper
Times cited : (69)

References (18)
  • 3
    • 84955621400 scopus 로고    scopus 로고
    • Tamper resistant software: An implementation
    • R.J. Anderson ed., Information Hiding: First International Workshop, Springer-Verlag
    • D. Aucsmith, "Tamper resistant software: An implementation," in R.J. Anderson ed., Information Hiding: First International Workshop, Lecture Notes in Computer Science, vol. 1174, pp.317-333, Springer-Verlag, 1996.
    • (1996) Lecture Notes in Computer Science , vol.1174 , pp. 317-333
    • Aucsmith, D.1
  • 4
    • 0004046658 scopus 로고    scopus 로고
    • A taxonomy of obfuscating transformations
    • Department of Computer Science, the University of Auckland, Auckland, New Zealand
    • C. Collberg, C. Thomborson, and D. Low, A taxonomy of obfuscating transformations, Technical Report 148, Department of Computer Science, the University of Auckland, Auckland, New Zealand, 1997.
    • (1997) Technical Report , vol.148
    • Collberg, C.1    Thomborson, C.2    Low, D.3
  • 7
    • 0001943763 scopus 로고    scopus 로고
    • Time limited Blackbox security: Protecting mobile agents from malicious hosts
    • G. Vigna ed., Mobile Agents Security, Springer-Verlag
    • F. Hohl, "Time limited Blackbox security: Protecting mobile agents from malicious hosts," in G. Vigna ed., Mobile Agents Security, Lecture Notes in Computer Science, vol.1419, pp.92-113, Springer-Verlag, 1998.
    • (1998) Lecture Notes in Computer Science , vol.1419 , pp. 92-113
    • Hohl, F.1
  • 10
    • 84958760367 scopus 로고    scopus 로고
    • A tentative approach to constructing tamper-resistant software
    • Sept.
    • M. Mambo, T. Murayama, and E. Okamoto, "A tentative approach to constructing tamper-resistant software," New Security Paradigm Workshop, pp.23-33, Sept. 1997.
    • (1997) New Security Paradigm Workshop , pp. 23-33
    • Mambo, M.1    Murayama, T.2    Okamoto, E.3
  • 11
    • 0025548384 scopus 로고
    • Properties of data flow frameworks: A unified model
    • T.J. Marlowe and B.G. Ryder, "Properties of data flow frameworks: A unified model," Acta Inf., vol.28, no.2, pp.121-163, 1990.
    • (1990) Acta Inf. , vol.28 , Issue.2 , pp. 121-163
    • Marlowe, T.J.1    Ryder, B.G.2
  • 13
    • 4243775814 scopus 로고    scopus 로고
    • On the complexity of function pointer may-alias analysis
    • Department of Computer Science, University of Arizona, Oct.
    • R. Muth and S. Debray, On the complexity of function pointer may-alias analysis, Technical Report TR96-18, Department of Computer Science, University of Arizona, Oct. 1996.
    • (1996) Technical Report , vol.TR96-18
    • Muth, R.1    Debray, S.2
  • 15
    • 0028510908 scopus 로고
    • The undecidability of aliasing
    • Nov.
    • G. Ramalingam, "The undecidability of aliasing," ACM Trans. Prog. Lang. Syst., vol.16, no.6, pp.1467-1471, Nov. 1994.
    • (1994) ACM Trans. Prog. Lang. Syst. , vol.16 , Issue.6 , pp. 1467-1471
    • Ramalingam, G.1
  • 16
    • 0012037951 scopus 로고    scopus 로고
    • Software tamper resistance: Obstructing static analysis of programs
    • Department of Computer Science, University of Virginia, Dec.
    • C. Wang, J. Hill, J. Knight, and J. Davidson, "Software tamper resistance: Obstructing static analysis of programs," Technical Report CS-2000-12, Department of Computer Science, University of Virginia, Dec. 2000.
    • (2000) Technical Report , vol.CS-2000-12
    • Wang, C.1    Hill, J.2    Knight, J.3    Davidson, J.4
  • 18
    • 84957032408 scopus 로고
    • Complexity of single level function pointer aliasing analysis
    • Laboratory of Computer Science Research, Rutgers University, Oct.
    • S. Zhang and B. Ryder, Complexity of single level function pointer aliasing analysis, Technical Report LCSR-TR-233, Laboratory of Computer Science Research, Rutgers University, Oct. 1994.
    • (1994) Technical Report , vol.LCSR-TR-233
    • Zhang, S.1    Ryder, B.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.