-
1
-
-
79251578513
-
On the (im)ossibility of software obfuscation
-
Proc. Advances in Cryptology (CRYPTO 2001)
-
B. Barak, O. Goldreich, R. Impagliazzo, S. Rudich, A. Sahai, S. Vadhan, and K. Yangpages, "On the (im)ossibility of software obfuscation," Proc. Advances in Cryptology (CRYPTO 2001), LNCS 2139, pp.1-18, 2001.
-
(2001)
LNCS
, vol.2139
, pp. 1-18
-
-
Barak, B.1
Goldreich, O.2
Impagliazzo, R.3
Rudich, S.4
Sahai, A.5
Vadhan, S.6
Yangpages, K.7
-
2
-
-
0344128124
-
Methods for scrambling program containing loops
-
(Japanese Edition), July
-
A. Monden, Y. Takada, and K. Torii, "Methods for scrambling program containing loops," IEICE Trans. Inf. & Syst.,(Japanese Edition), Vol.J80-D-I, no.7, pp.644-652, July 1997.
-
(1997)
IEICE Trans. Inf. & Syst.
, vol.J80-D-I
, Issue.7
, pp. 644-652
-
-
Monden, A.1
Takada, Y.2
Torii, K.3
-
4
-
-
0036704573
-
Watermarking, tamperproofing, and obfuscation - Tools for software protection
-
C. Collberg and C. Thomborson, "Watermarking, tamperproofing, and obfuscation - Tools for software protection," IEEE Trans. Software Maintenance, vol.28, no.8, pp.735-746, 2002.
-
(2002)
IEEE Trans. Software Maintenance
, vol.28
, Issue.8
, pp. 735-746
-
-
Collberg, C.1
Thomborson, C.2
-
5
-
-
1242297829
-
Advanced obfuscation techniques for Java bytecode
-
J.T. Chan and W. Yang, "Advanced obfuscation techniques for Java bytecode," J. Syst. Softw., vol.71, no.1-2, pp.1-10, 2004.
-
(2004)
J. Syst. Softw.
, vol.71
, Issue.1-2
, pp. 1-10
-
-
Chan, J.T.1
Yang, W.2
-
6
-
-
18844377176
-
Obfuscation of design intent in object-oriented applications
-
M. Sosonkin, G. Naumovich, and N.D. Memon, "Obfuscation of design intent in object-oriented applications," Proc. Third ACM Workshop on Digital Rights Management (DRM 2003), pp. 142-153, 2003.
-
(2003)
Proc. Third ACM Workshop on Digital Rights Management (DRM 2003)
, pp. 142-153
-
-
Sosonkin, M.1
Naumovich, G.2
Memon, N.D.3
-
7
-
-
0012037951
-
Software tamper resistance: Obfuscating staticanalysis of programs
-
Dept. of Computer Science, University of Virginia
-
C. Wang, J. Hill, J. Knight, and J. Davidson, "Software tamper resistance: Obfuscating staticanalysis of programs," Tech. Rep., SC-2000-2012, Dept. of Computer Science, University of Virginia, 2000.
-
(2000)
Tech. Rep., SC-2000-2012
-
-
Wang, C.1
Hill, J.2
Knight, J.3
Davidson, J.4
-
8
-
-
0041475743
-
Software obfuscation on a theoretical basis and its implementation
-
Jan.
-
T. Ogiso, Y. Sakabe, M. Soushi, and A. Miyaji, "Software obfuscation on a theoretical basis and its implementation," IEICE Trans. Fundamentals, vol.E86-A, no.l, pp.176-186, Jan. 2003.
-
(2003)
IEICE Trans. Fundamentals
, vol.E86-A
, Issue.1
, pp. 176-186
-
-
Ogiso, T.1
Sakabe, Y.2
Soushi, M.3
Miyaji, A.4
-
9
-
-
35248814855
-
Java obfuscation with a theoretical basis for building secure mobile agents
-
Proc. Seventh IFIP TC-6 TC-11 Conference on Communications and Multimedia Security (CMS 2003)
-
Y. Sakabe, M. Soshi, and A. Miyaji, "Java obfuscation with a theoretical basis for building secure mobile agents," Proc. Seventh IFIP TC-6 TC-11 Conference on Communications and Multimedia Security (CMS 2003), LNCS 2828, pp.89-103, 2003.
-
(2003)
LNCS
, vol.2828
, pp. 89-103
-
-
Sakabe, Y.1
Soshi, M.2
Miyaji, A.3
-
10
-
-
10944251971
-
Data obfuscation: Anonymity and desensitization of usable data sets
-
D.E. Bakken, R. Parameswaran, D.M. Blough, A.A. Franz, and T.J. Palmer, "Data obfuscation: Anonymity and desensitization of usable data sets," IEEE Security and Privacy, vol.2, no.6, pp.34-41, 2004.
-
(2004)
IEEE Security and Privacy
, vol.2
, Issue.6
, pp. 34-41
-
-
Bakken, D.E.1
Parameswaran, R.2
Blough, D.M.3
Franz, A.A.4
Palmer, T.J.5
-
11
-
-
0004046658
-
A taxonomy of obfuscating transformations
-
Dept. of Computer Science, University of Auckland
-
C. Collberg, C. Thomborson, and D. Low, "A taxonomy of obfuscating transformations," Tech. Rep., 148, Dept. of Computer Science, University of Auckland, 1997.
-
(1997)
Tech. Rep.148
-
-
Collberg, C.1
Thomborson, C.2
Low, D.3
-
12
-
-
85027170399
-
Program obfuscation by coding data and its operation
-
H. Sato, A. Monden, and K. Matsumoto, "Program obfuscation by coding data and its operation," IEICE Technical Report, vol.102, no.743,pp.l3-18, 2003.
-
(2003)
IEICE Technical Report
, vol.102
, Issue.743
-
-
Sato, H.1
Monden, A.2
Matsumoto, K.3
-
13
-
-
77951262113
-
Obfuscation scheme using affine transformation and its implementation
-
K. Fukushima, S. Kiyomoto, and T. Tanaka, "Obfuscation scheme using affine transformation and its implementation," IPSJ Journal, vol.47, no.8, pp.2556-2570, 2006.
-
(2006)
IPSJ Journal
, vol.47
, Issue.8
, pp. 2556-2570
-
-
Fukushima, K.1
Kiyomoto, S.2
Tanaka, T.3
-
14
-
-
85027131984
-
An approach to quantitative analysis of resistance of equivalent transformations of algebraic circuits
-
A.V. Shokurov, "An approach to quantitative analysis of resistance of equivalent transformations of algebraic circuits," Tech. Rep., In- stitute for System Programming, Russian Academy of Sciences. http://www.ispras.ru/news/downloads/obfuscation/shok.pdf
-
Tech. Rep.
-
-
Shokurov, A.V.1
-
15
-
-
77951284742
-
Obfuscation scheme using exclusive-or encoding
-
K. Fukushima, S. Kiyomoto, and T. Tanaka, "Obfuscation scheme using exclusive-or encoding," Proc. 7th International Workshop on Information Security Applications (WISA2006), pp.453-1167, 2006.
-
(2006)
Proc. 7th International Workshop on Information Security Applications (WISA2006)
, pp. 453-1167
-
-
Fukushima, K.1
Kiyomoto, S.2
Tanaka, T.3
-
16
-
-
33847210738
-
Software obfuscation from crackers' viewpoint
-
H. Yamauchi, Y. Kanzaki, A. Monden, M. Nakamura, and K. Matsumoto, "Software obfuscation from crackers' viewpoint," Proc. IASTED International Conference on Advances in Computer Science and Technology, pp.23-25, 2006.
-
(2006)
Proc. IASTED International Conference on Advances in Computer Science and Technology
, pp. 23-25
-
-
Yamauchi, H.1
Kanzaki, Y.2
Monden, A.3
Nakamura, M.4
Matsumoto, K.5
-
17
-
-
33846192387
-
Deobfuscation: Reverse engineering obfuscated code
-
S.K. Udupa, S.K. Debray, and M. Madou, "Deobfuscation: Reverse engineering obfuscated code," Proc. 12th Working Conference on Reverse Engineering (WCRE'05), pp.45-54, 2005.
-
(2005)
Proc. 12th Working Conference on Reverse Engineering (WCRE'05)
, pp. 45-54
-
-
Udupa, S.K.1
Debray, S.K.2
Madou, M.3
-
18
-
-
84944220914
-
An approach to the objective and quantitative evaluation of tamper-resistant software
-
Proc. Third International Workshop on Information Security (ISW2000)
-
H. Goto, M. Mambo, K. Matsumura, and H. Shizuya, "An approach to the objective and quantitative evaluation of tamper-resistant software," Proc. Third International Workshop on Information Security (ISW2000), LNCS 1975, pp.82-96, 2000.
-
(2000)
LNCS
, vol.1975
, pp. 82-96
-
-
Goto, H.1
Mambo, M.2
Matsumura, K.3
Shizuya, H.4
-
19
-
-
84958760133
-
Evaluation of tamper-resistant software deviating from structured programming rules
-
Proc. Sixth Australasian Conference on Information Security and Privacy (ACISP2001)
-
H. Goto, M. Mambo, H. Shizuya, and Y. Watanabe, "Evaluation of tamper-resistant software deviating from structured programming rules," Proc. Sixth Australasian Conference on Information Security and Privacy (ACISP2001), LNCS 2119, pp.145-158, 2001.
-
(2001)
LNCS
, vol.2119
, pp. 145-158
-
-
Goto, H.1
Mambo, M.2
Shizuya, H.3
Watanabe, Y.4
|