-
3
-
-
79251578513
-
On the (im)possibility of obfuscating programs
-
Springer-Verlag
-
Boaz Barak, Oded Goldreich, Russell Impagliazzo, Steven Rudich, Amit Sahai, Salil P. Vadhan, and Ke Yang. On the (im)possibility of obfuscating programs. In Proceedings of the 21st Annual International Cryptology Conference on Advances in Cryptology, pages 1-18. Springer-Verlag, 2001.
-
(2001)
Proceedings of the 21st Annual International Cryptology Conference on Advances in Cryptology
, pp. 1-18
-
-
Barak, B.1
Goldreich, O.2
Impagliazzo, R.3
Rudich, S.4
Sahai, A.5
Vadhan, S.P.6
Yang, K.7
-
4
-
-
0037925302
-
An empirical study of predicate dependence levels and trends
-
Washington, DC, USA, IEEE Computer Society
-
David Binkley and Mark Harman. An empirical study of predicate dependence levels and trends. In ICSE '03: Proceedings of the 25th International Conference on Software Engineering, pages 330-339, Washington, DC, USA, 2003. IEEE Computer Society.
-
(2003)
ICSE '03: Proceedings of the 25th International Conference on Software Engineering
, pp. 330-339
-
-
Binkley, D.1
Harman, M.2
-
5
-
-
77956611660
-
A large-scale empirical study of forward and backward static slice size and context sensitivity
-
Washington, DC, USA, IEEE Computer Society
-
David Binkley and Mark Harman. A large-scale empirical study of forward and backward static slice size and context sensitivity. In ICSM '03: Proceedings of the International Conference on Software Maintenance, pages 44-53, Washington, DC, USA, 2003. IEEE Computer Society.
-
(2003)
ICSM '03: Proceedings of the International Conference on Software Maintenance
, pp. 44-53
-
-
Binkley, D.1
Harman, M.2
-
6
-
-
36949010279
-
Silver needle in the Skype
-
Presentation at March Available from
-
Phillipe Biondi and Fabrice Desclaux. Silver needle in the Skype. Presentation at BlackHat Europe, March 2006. Available from www.blackhat.com/ html/bh-media-archives/bh-archives-2006.html.
-
(2006)
BlackHat Europe
-
-
Biondi, P.1
Desclaux, F.2
-
7
-
-
0004046658
-
-
Technical Report 148, Department of Computer Science, University of Auckland, July
-
Christian Collberg, Clark D. Thomborson, and Douglas Low. A taxonomy of obfuscating transformations. Technical Report 148, Department of Computer Science, University of Auckland, July 1997.
-
(1997)
A Taxonomy of Obfuscating Transformations
-
-
Collberg, C.1
Thomborson, C.D.2
Low, D.3
-
8
-
-
0031649930
-
Manufacturing cheap, resilient, and stealthy opaque constructs
-
New York, NY, USA, ACM Press
-
Christian Collberg, Clark D. Thomborson, and Douglas Low. Manufacturing cheap, resilient, and stealthy opaque constructs. In POPL '98: Proceedings of the 25th ACM SIGPLAN-SIGACT symposium on Principles of programming languages, pages 184-196, New York, NY, USA, 1998. ACM Press.
-
(1998)
POPL '98: Proceedings of the 25th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages
, pp. 184-196
-
-
Collberg, C.1
Thomborson, C.D.2
Low, D.3
-
9
-
-
0026243790
-
Efficiently computing static single assignment form and the control dependence graph
-
October
-
Ron Cytron, Jeanne Ferrante, Barry K. Rosen, Mark N. Wegman, and F. Kenneth Zadeck. Efficiently computing static single assignment form and the control dependence graph. ACM Transactions on Programming Languages and Systems, 13(4):451-490, October 1991.
-
(1991)
ACM Transactions on Programming Languages and Systems
, vol.13
, Issue.4
, pp. 451-490
-
-
Cytron, R.1
Ferrante, J.2
Rosen, B.K.3
Wegman, M.N.4
Kenneth Zadeck, F.5
-
11
-
-
33751119227
-
-
DPhil thesis, Oxford University Computing Laboratory
-
Stephen Drape. Obfuscation of Abstract Data-Types. DPhil thesis, Oxford University Computing Laboratory, 2004.
-
(2004)
Obfuscation of Abstract Data-Types
-
-
Drape, S.1
-
14
-
-
46749137549
-
Slicing aided design of obfuscating transforms
-
IEEE Computer Society
-
Stephen Drape, Anirban Majumdar, and Clark Thomborson. Slicing aided design of obfuscating transforms. In IEEE/ACIS ICIS 2007: In proceedings of the International Computing and Information Systems Conference (ICIS 2007), Melbourne, Australia, 2007. IEEE Computer Society.
-
IEEE/ACIS ICIS 2007: In Proceedings of the International Computing and Information Systems Conference (ICIS 2007), Melbourne, Australia, 2007
-
-
Drape, S.1
Majumdar, A.2
Thomborson, C.3
-
16
-
-
0025228221
-
Interprocedural slicing using dependence graphs
-
DOI 10.1145/77606.77608
-
Susan Horwitz, Thomas Reps, and David Binkley. Interprocedural slicing using dependence graphs. ACM Transactions on Programming Languages and Systems (TOPLAS), 12(1):26-60, 1990. (Pubitemid 20660161)
-
(1990)
ACM Transactions on Programming Languages and Systems
, vol.12
, Issue.1
, pp. 26-60
-
-
Horwitz, S.1
Reps, T.2
Binkley, D.3
-
17
-
-
24644509050
-
Kaveri: Delivering the Indus Java program slicer to Eclipse
-
FASE, SpringerVerlag
-
Ganeshan Jayaraman, Venkatesh Prasad Ranganath, and John Hatcliff. Kaveri: Delivering the Indus Java program slicer to Eclipse. In FASE, pages 269-272. Lecture Notes In Computer Science, SpringerVerlag, 2005.
-
(2005)
Lecture Notes in Computer Science
, pp. 269-272
-
-
Jayaraman, G.1
Ranganath, V.P.2
Hatcliff, J.3
-
18
-
-
47649094781
-
On evaluating obfuscatory strength of alias-based transforms using static analysis
-
IEEE Computer Society
-
Anirban Majumdar, Antoine Monsifrot, and Clark D. Thomborson. On evaluating obfuscatory strength of alias-based transforms using static analysis. In ADCOM 2006: Proceedings of the 14th International Conference on Advanced Computing and Communication (ADCOM 2006), Mangalore, India, 2006. IEEE Computer Society.
-
ADCOM 2006: Proceedings of the 14th International Conference on Advanced Computing and Communication (ADCOM 2006), Mangalore, India, 2006
-
-
Majumdar, A.1
Monsifrot, A.2
Thomborson, C.D.3
-
19
-
-
46749141940
-
A survey of control-flow obfuscations
-
December
-
Anirban Majumdar, Clark D. Thomborson, and Stephen Drape. A survey of control-flow obfuscations. In Information Systems Security, Second International Conference, ICISS 2006, Kolkata, India, pages 353-356, December 2006.
-
(2006)
Information Systems Security, Second International Conference, ICISS 2006, Kolkata, India
, pp. 353-356
-
-
Majumdar, A.1
Thomborson, C.D.2
Drape, S.3
-
22
-
-
84979026645
-
Identifying comprehension bottlenecks using program slicing and cognitive complexity metrics
-
Washington, DC, USA, IEEE Computer Society
-
Juergen Rilling and Tuomas Klemola. Identifying comprehension bottlenecks using program slicing and cognitive complexity metrics. In IWPC '03: Proceedings of the 11th IEEE International Workshop on Program Comprehension, pages 115-124, Washington, DC, USA, 2003. IEEE Computer Society.
-
(2003)
IWPC '03: Proceedings of the 11th IEEE International Workshop on Program Comprehension
, pp. 115-124
-
-
Rilling, J.1
Klemola, T.2
-
23
-
-
38149092534
-
A Generic DRM Framework for J2ME Applications
-
In Olli Pitkänen, editor, Helsinki Institute for Information Tecnhology, August
-
Nuno Santos, Pedro Pereira, and Luís Moura e Silva. A Generic DRM Framework for J2ME Applications. In Olli Pitkänen, editor, First International Mobile IPR Workshop: Rights Management of Information (MobileIPR), pages 53-66. Helsinki Institute for Information Tecnhology, August 2003.
-
(2003)
First International Mobile IPR Workshop: Rights Management of Information (MobileIPR)
, pp. 53-66
-
-
Santos, N.1
Pereira, P.2
Silva, L.M.E.3
-
24
-
-
0004096330
-
-
Technical Report CS-R9438, CWI (Centre for Mathematics and Computer Science), Amsterdam, The Netherlands
-
Frank Tip. A survey of program slicing techniques. Technical Report CS-R9438, CWI (Centre for Mathematics and Computer Science), Amsterdam, The Netherlands, 1994.
-
(1994)
A Survey of Program Slicing Techniques
-
-
Tip, F.1
-
25
-
-
33846192387
-
Deobfuscation: Reverse engineering obfuscated code
-
Washington, DC, USA, IEEE Computer Society
-
Sharath K. Udupa, Saumya K. Debray, and Matias Madou. Deobfuscation: Reverse engineering obfuscated code. In WCRE '05: Proceedings of the 12th Working Conference on Reverse Engineering, pages 45-54, Washington, DC, USA, 2005. IEEE Computer Society.
-
(2005)
WCRE '05: Proceedings of the 12th Working Conference on Reverse Engineering
, pp. 45-54
-
-
Udupa, S.K.1
Debray, S.K.2
Madou, M.3
|