메뉴 건너뛰기




Volumn 4779 LNCS, Issue , 2007, Pages 281-298

On the concept of software obfuscation in computer security

Author keywords

Encryption; Program obfuscation; Security; Turing machine

Indexed keywords

CRYPTOGRAPHY; INFORMATION ANALYSIS; MATHEMATICAL TRANSFORMATIONS; SECURITY OF DATA; SEMANTIC WEB;

EID: 38149067514     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-75496-1_19     Document Type: Conference Paper
Times cited : (29)

References (32)
  • 1
    • 84955621400 scopus 로고    scopus 로고
    • Tamper resistant software: An implementation
    • Anderson, R, ed, Information Hiding, Springer, Heidelberg
    • Aucsmith, D.: Tamper resistant software: an implementation. In: Anderson, R. (ed.) Information Hiding. LNCS, vol. 1174, pp. 317-333. Springer, Heidelberg (1996)
    • (1996) LNCS , vol.1174 , pp. 317-333
    • Aucsmith, D.1
  • 3
    • 79251578513 scopus 로고    scopus 로고
    • On the (im)possibility of obfuscating programs
    • Kilián, J, ed, CRYPTO 2001, Springer, Heidelberg
    • Barak, B., Goldreich, O., Impagliazzo, R., Rudich, S., Sahai, A., Vadhan, S., Yang, K.: On the (im)possibility of obfuscating programs. In: Kilián, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 1-18. Springer, Heidelberg (2001)
    • (2001) LNCS , vol.2139 , pp. 1-18
    • Barak, B.1    Goldreich, O.2    Impagliazzo, R.3    Rudich, S.4    Sahai, A.5    Vadhan, S.6    Yang, K.7
  • 5
    • 84958626314 scopus 로고    scopus 로고
    • Towards realizing random oracles: Hash functions that hide all partial information
    • Kaliski Jr, B.S, ed, CRYPTO 1997, Springer, Heidelberg
    • Canetti, R.: Towards realizing random oracles: hash functions that hide all partial information. In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol. 1294, pp. 455-469. Springer, Heidelberg (1997)
    • (1997) LNCS , vol.1294 , pp. 455-469
    • Canetti, R.1
  • 8
    • 84947229190 scopus 로고    scopus 로고
    • An approach to obfuscation of control-flow of sequential programs
    • Wilhelm, R, ed, Informatics, Springer, Heidelberg
    • Chow, S., Gu, Y., Johnson, H., Zakharov, V.: An approach to obfuscation of control-flow of sequential programs. In: Wilhelm, R. (ed.) Informatics. LNCS, vol. 2000, pp. 144-155. Springer, Heidelberg (2001)
    • (2001) LNCS , vol.2000 , pp. 144-155
    • Chow, S.1    Gu, Y.2    Johnson, H.3    Zakharov, V.4
  • 9
    • 0027684663 scopus 로고
    • Operating system protection through program evolution
    • Cohen, F.: Operating system protection through program evolution. Computers and Security 12(6), 565-584 (1993)
    • (1993) Computers and Security , vol.12 , Issue.6 , pp. 565-584
    • Cohen, F.1
  • 10
    • 0004046658 scopus 로고    scopus 로고
    • A Taxonomy of Obfuscating Transformations
    • Tech. Report, N 148, Univ. of Auckland
    • Collberg, C., Thomborson, C., Low, D.: A Taxonomy of Obfuscating Transformations. Tech. Report, N 148, Univ. of Auckland (1997)
    • (1997)
    • Collberg, C.1    Thomborson, C.2    Low, D.3
  • 12
    • 0036704573 scopus 로고    scopus 로고
    • Watermarking, Tamper-Proofing, and Obfuscation - Tools for Software Protection
    • Collberg, C., Thomborson, C.: Watermarking, Tamper-Proofing, and Obfuscation - Tools for Software Protection. IEEE Transactions on Software Engineering 28(6) (2002)
    • (2002) IEEE Transactions on Software Engineering , vol.28 , Issue.6
    • Collberg, C.1    Thomborson, C.2
  • 13
    • 26444541676 scopus 로고    scopus 로고
    • Semantic-based code obfuscation by abstract interpretation
    • Caires, L, Italiano, G.F, Monteiro, L, Palamidessi, C, Yung, M, eds, ICALP 2005, Springer, Heidelberg
    • Dalla Preda, M., Giacobazzi, R.: Semantic-based code obfuscation by abstract interpretation. In: Caires, L., Italiano, G.F., Monteiro, L., Palamidessi, C., Yung, M. (eds.) ICALP 2005. LNCS, vol. 3580, pp. 1325-1336. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3580 , pp. 1325-1336
    • Dalla Preda, M.1    Giacobazzi, R.2
  • 19
    • 38049015775 scopus 로고    scopus 로고
    • Goldwasser, S., Rothblum, G.N.: On best possible obfuction. In: Vadhan, S.P. (ed.) TCC 2007. LNCS, 4392, pp. 194-213. Springer, Heidelberg (2007)
    • Goldwasser, S., Rothblum, G.N.: On best possible obfuction. In: Vadhan, S.P. (ed.) TCC 2007. LNCS, vol. 4392, pp. 194-213. Springer, Heidelberg (2007)
  • 20
    • 84937414062 scopus 로고    scopus 로고
    • Zero-knowledge and code obfuscation
    • Okamoto, T, ed, ASIACRYPT 2000, Springer, Heidelberg
    • Hada, S.: Zero-knowledge and code obfuscation. In: Okamoto, T. (ed.) ASIACRYPT 2000. LNCS, vol. 1976, pp. 443-457. Springer, Heidelberg (2000)
    • (2000) LNCS , vol.1976 , pp. 443-457
    • Hada, S.1
  • 21
    • 0001943763 scopus 로고    scopus 로고
    • Time limited blackbox security: Protecting mobile agents from malicious hosts
    • Vigna, G, ed, Mobile Agents and Security, Springer, Heidelberg
    • Hohl, F.: Time limited blackbox security: protecting mobile agents from malicious hosts. In: Vigna, G. (ed.) Mobile Agents and Security. LNCS, vol. 1419, pp. 92-113. Springer, Heidelberg (1998)
    • (1998) LNCS , vol.1419 , pp. 92-113
    • Hohl, F.1
  • 22
    • 38049056625 scopus 로고    scopus 로고
    • Hofheinz, D., Malone-Lee, J., Stam, M.: Obfuscation for cryptographic purpose. In: Vadhan, S.P. (ed.) TCC 2007. LNCS, 4392, pp. 214-232. Springer, Heidelberg (2007)
    • Hofheinz, D., Malone-Lee, J., Stam, M.: Obfuscation for cryptographic purpose. In: Vadhan, S.P. (ed.) TCC 2007. LNCS, vol. 4392, pp. 214-232. Springer, Heidelberg (2007)
  • 24
    • 35048895442 scopus 로고    scopus 로고
    • Positive results and techniques for obfuscation
    • Cachin, C, Camenisch, J.L, eds, EUROCRYPT 2004, Springer, Heidelberg
    • Lynn, B., Prabhakaran, M., Sahai, A.: Positive results and techniques for obfuscation. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 20-39. Springer, Heidelberg (2004)
    • (2004) LNCS , vol.3027 , pp. 20-39
    • Lynn, B.1    Prabhakaran, M.2    Sahai, A.3
  • 25
    • 0041475743 scopus 로고    scopus 로고
    • Software obfuscation on a theoretical basis and its implementation
    • Ogiso, T., Sakabe, Y., Soshi, M., Miyaji, A.: Software obfuscation on a theoretical basis and its implementation. IEEE Trans. Fundamentals E86-A(1) (2003)
    • (2003) IEEE Trans. Fundamentals , vol.E86-A , Issue.1
    • Ogiso, T.1    Sakabe, Y.2    Soshi, M.3    Miyaji, A.4
  • 26
    • 33745177806 scopus 로고    scopus 로고
    • Private searching on streaming data
    • Shoup, V, ed, CRYPTO 2005, Springer, Heidelberg
    • Ostrovsky, R., Skeith, W.E.: Private searching on streaming data. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol. 3621, pp. 223-240. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3621 , pp. 223-240
    • Ostrovsky, R.1    Skeith, W.E.2
  • 28
    • 0021518106 scopus 로고
    • A theory of learnable
    • Valiant, L.: A theory of learnable. Communications of the ACM 27(11), 1134-1142 (1984)
    • (1984) Communications of the ACM , vol.27 , Issue.11 , pp. 1134-1142
    • Valiant, L.1
  • 29
    • 33244496918 scopus 로고    scopus 로고
    • Varnovsky, N.P., Zakharov, V.A.: On the possibility of provably secure obfuscating programs. In: Broy, M., Zamulin, A.V. (eds.) PSI 2003. LNCS, 2890, pp. 91-102. Springer, Heidelberg (2004)
    • Varnovsky, N.P., Zakharov, V.A.: On the possibility of provably secure obfuscating programs. In: Broy, M., Zamulin, A.V. (eds.) PSI 2003. LNCS, vol. 2890, pp. 91-102. Springer, Heidelberg (2004)


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.