메뉴 건너뛰기




Volumn E91-A, Issue 1, 2008, Pages 316-329

Analysis of program obfuscation schemes with variable encoding technique

Author keywords

Analysis; Program obfuscation; Variable encoding technique

Indexed keywords

COLLECTOR EFFICIENCY; EFFICIENCY; LINEAR TRANSFORMATIONS; MATHEMATICAL TRANSFORMATIONS; METADATA;

EID: 70749094001     PISSN: 09168508     EISSN: 17451337     Source Type: Journal    
DOI: 10.1093/ietfec/e91-a.1.316     Document Type: Article
Times cited : (14)

References (19)
  • 1
    • 79251578513 scopus 로고    scopus 로고
    • On the (im)ossibility of software obfuscation
    • Proc. Advances in Cryptology (CRYPTO 2001)
    • B. Barak, O. Goldreich, R. Impagliazzo, S. Rudich, A. Sahai, S. Vadhan, and K. Yangpages, "On the (im)ossibility of software obfuscation," Proc. Advances in Cryptology (CRYPTO 2001), LNCS 2139, pp.1-18, 2001.
    • (2001) LNCS , vol.2139 , pp. 1-18
    • Barak, B.1    Goldreich, O.2    Impagliazzo, R.3    Rudich, S.4    Sahai, A.5    Vadhan, S.6    Yangpages, K.7
  • 2
    • 0344128124 scopus 로고    scopus 로고
    • Methods for scrambling program containing loops
    • (Japanese Edition), July
    • A. Monden, Y. Takada, and K. Torii, "Methods for scrambling program containing loops," IEICE Trans. Inf. & Syst.,(Japanese Edition), Vol.J80-D-I, no.7, pp.644-652, July 1997.
    • (1997) IEICE Trans. Inf. & Syst. , vol.J80-D-I , Issue.7 , pp. 644-652
    • Monden, A.1    Takada, Y.2    Torii, K.3
  • 4
    • 0036704573 scopus 로고    scopus 로고
    • Watermarking, tamperproofing, and obfuscation - Tools for software protection
    • C. Collberg and C. Thomborson, "Watermarking, tamperproofing, and obfuscation - Tools for software protection," IEEE Trans. Software Maintenance, vol.28, no.8, pp.735-746, 2002.
    • (2002) IEEE Trans. Software Maintenance , vol.28 , Issue.8 , pp. 735-746
    • Collberg, C.1    Thomborson, C.2
  • 5
    • 1242297829 scopus 로고    scopus 로고
    • Advanced obfuscation techniques for Java bytecode
    • J.T. Chan and W. Yang, "Advanced obfuscation techniques for Java bytecode," J. Syst. Softw., vol.71, no.1-2, pp.1-10, 2004.
    • (2004) J. Syst. Softw. , vol.71 , Issue.1-2 , pp. 1-10
    • Chan, J.T.1    Yang, W.2
  • 7
    • 0012037951 scopus 로고    scopus 로고
    • Software tamper resistance: Obfuscating staticanalysis of programs
    • Dept. of Computer Science, University of Virginia
    • C. Wang, J. Hill, J. Knight, and J. Davidson, "Software tamper resistance: Obfuscating staticanalysis of programs," Tech. Rep., SC-2000-2012, Dept. of Computer Science, University of Virginia, 2000.
    • (2000) Tech. Rep., SC-2000-2012
    • Wang, C.1    Hill, J.2    Knight, J.3    Davidson, J.4
  • 8
    • 0041475743 scopus 로고    scopus 로고
    • Software obfuscation on a theoretical basis and its implementation
    • Jan.
    • T. Ogiso, Y. Sakabe, M. Soushi, and A. Miyaji, "Software obfuscation on a theoretical basis and its implementation," IEICE Trans. Fundamentals, vol.E86-A, no.l, pp.176-186, Jan. 2003.
    • (2003) IEICE Trans. Fundamentals , vol.E86-A , Issue.1 , pp. 176-186
    • Ogiso, T.1    Sakabe, Y.2    Soushi, M.3    Miyaji, A.4
  • 9
    • 35248814855 scopus 로고    scopus 로고
    • Java obfuscation with a theoretical basis for building secure mobile agents
    • Proc. Seventh IFIP TC-6 TC-11 Conference on Communications and Multimedia Security (CMS 2003)
    • Y. Sakabe, M. Soshi, and A. Miyaji, "Java obfuscation with a theoretical basis for building secure mobile agents," Proc. Seventh IFIP TC-6 TC-11 Conference on Communications and Multimedia Security (CMS 2003), LNCS 2828, pp.89-103, 2003.
    • (2003) LNCS , vol.2828 , pp. 89-103
    • Sakabe, Y.1    Soshi, M.2    Miyaji, A.3
  • 11
    • 0004046658 scopus 로고    scopus 로고
    • A taxonomy of obfuscating transformations
    • Dept. of Computer Science, University of Auckland
    • C. Collberg, C. Thomborson, and D. Low, "A taxonomy of obfuscating transformations," Tech. Rep., 148, Dept. of Computer Science, University of Auckland, 1997.
    • (1997) Tech. Rep.148
    • Collberg, C.1    Thomborson, C.2    Low, D.3
  • 12
    • 85027170399 scopus 로고    scopus 로고
    • Program obfuscation by coding data and its operation
    • H. Sato, A. Monden, and K. Matsumoto, "Program obfuscation by coding data and its operation," IEICE Technical Report, vol.102, no.743,pp.l3-18, 2003.
    • (2003) IEICE Technical Report , vol.102 , Issue.743
    • Sato, H.1    Monden, A.2    Matsumoto, K.3
  • 13
    • 77951262113 scopus 로고    scopus 로고
    • Obfuscation scheme using affine transformation and its implementation
    • K. Fukushima, S. Kiyomoto, and T. Tanaka, "Obfuscation scheme using affine transformation and its implementation," IPSJ Journal, vol.47, no.8, pp.2556-2570, 2006.
    • (2006) IPSJ Journal , vol.47 , Issue.8 , pp. 2556-2570
    • Fukushima, K.1    Kiyomoto, S.2    Tanaka, T.3
  • 14
    • 85027131984 scopus 로고    scopus 로고
    • An approach to quantitative analysis of resistance of equivalent transformations of algebraic circuits
    • A.V. Shokurov, "An approach to quantitative analysis of resistance of equivalent transformations of algebraic circuits," Tech. Rep., In- stitute for System Programming, Russian Academy of Sciences. http://www.ispras.ru/news/downloads/obfuscation/shok.pdf
    • Tech. Rep.
    • Shokurov, A.V.1
  • 18
    • 84944220914 scopus 로고    scopus 로고
    • An approach to the objective and quantitative evaluation of tamper-resistant software
    • Proc. Third International Workshop on Information Security (ISW2000)
    • H. Goto, M. Mambo, K. Matsumura, and H. Shizuya, "An approach to the objective and quantitative evaluation of tamper-resistant software," Proc. Third International Workshop on Information Security (ISW2000), LNCS 1975, pp.82-96, 2000.
    • (2000) LNCS , vol.1975 , pp. 82-96
    • Goto, H.1    Mambo, M.2    Matsumura, K.3    Shizuya, H.4
  • 19
    • 84958760133 scopus 로고    scopus 로고
    • Evaluation of tamper-resistant software deviating from structured programming rules
    • Proc. Sixth Australasian Conference on Information Security and Privacy (ACISP2001)
    • H. Goto, M. Mambo, H. Shizuya, and Y. Watanabe, "Evaluation of tamper-resistant software deviating from structured programming rules," Proc. Sixth Australasian Conference on Information Security and Privacy (ACISP2001), LNCS 2119, pp.145-158, 2001.
    • (2001) LNCS , vol.2119 , pp. 145-158
    • Goto, H.1    Mambo, M.2    Shizuya, H.3    Watanabe, Y.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.