Proceedings of the Third ACM SIGPLAN Workshop on Programming Languages and Analysis for Security 2008
DOI: 10.1145/1375696.1375702
|View full text |Cite
|
Sign up to set email alerts
|

A compiler-based infrastructure for software-protection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
9
0

Year Published

2012
2012
2021
2021

Publication Types

Select...
6
3

Relationship

0
9

Authors

Journals

citations
Cited by 16 publications
(9 citation statements)
references
References 11 publications
0
9
0
Order By: Relevance
“…Typically, junk instructions [16], equivalent instructions, packers [17,18], code encryption, above technology usually are used to resist disassembly and some static analysis. There are also other code protection techniques like code obfuscation [19], Control flow and data flow obfuscation [20][21][22],etc. these protection methods can only provide limited obscurity, So in practical applications, these approaches are seldom caught alone, and they usually combine with each other to protect an instance.…”
Section: Related Workmentioning
confidence: 99%
“…Typically, junk instructions [16], equivalent instructions, packers [17,18], code encryption, above technology usually are used to resist disassembly and some static analysis. There are also other code protection techniques like code obfuscation [19], Control flow and data flow obfuscation [20][21][22],etc. these protection methods can only provide limited obscurity, So in practical applications, these approaches are seldom caught alone, and they usually combine with each other to protect an instance.…”
Section: Related Workmentioning
confidence: 99%
“…Traditionally, techniques like junk instructions [20], packers [21], [22], are used to protect software against attacks based on disassembly and static analysis. There are also other code protection techniques like code obfuscation [23], control flow and data flow obfuscation [24], [25], [26], all aim to obfuscate the semantic and logical information of the target program. In practice, these approaches are often used in combination to provide stronger protection.…”
Section: Related Workmentioning
confidence: 99%
“…First, they can rewrite program source code. For example, the Tigress diversifying compiler [17] and the Cloakware diversification system [18] are obfuscators that apply source-to-source transformations on C code. At a lower level of abstraction are obfuscators that transform the compiler representation of code, such as obfuscator-llvm [19].…”
Section: Related Workmentioning
confidence: 99%