2018
DOI: 10.1016/bs.adcom.2017.09.004
|View full text |Cite
|
Sign up to set email alerts
|

A Tutorial on Software Obfuscation

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
14
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
3
3
2

Relationship

0
8

Authors

Journals

citations
Cited by 29 publications
(14 citation statements)
references
References 17 publications
0
14
0
Order By: Relevance
“…Many of these techniques are orthogonal to our work and focus on one specific transformation. For an overview over the field of obfuscation, we refer the interested reader to the tutorial by Banescu and Pretschner [3]. In the following, we discuss techniques closest to our work.…”
Section: Related Workmentioning
confidence: 99%
“…Many of these techniques are orthogonal to our work and focus on one specific transformation. For an overview over the field of obfuscation, we refer the interested reader to the tutorial by Banescu and Pretschner [3]. In the following, we discuss techniques closest to our work.…”
Section: Related Workmentioning
confidence: 99%
“…In the '80s, before an obfuscation research community was even born, malicious entities were regularly shielding malware and subverting anti-piracy licensing schemes used by vendors [9]. Some techniques like polymorphism later experienced a resurgence in the context of attack prevention [61], but it was only after the seminal taxonomy work of Collberg et al [27] that obfuscation research saw a remarkable growth in the number of proposed techniques [61].…”
Section: Code Obfuscationmentioning
confidence: 99%
“…To present obfuscation concepts relevant to the scope of this paper we mostly follow the recent classification proposed in [9].…”
Section: Code Obfuscationmentioning
confidence: 99%
See 1 more Smart Citation
“…The main countermeasure against these attacks is obfuscation, which can be defined as a transformation that produces a more complex program but which has the same observable behavior [1]. Several taxonomies classify the different obfuscation methods by the abstraction level (source code, machine code), the unit (instruction, function, program), or the target (data, code) of the performed transformation [2]. According to this classification, the abstraction level of our method is machine code, its unit of transformation is function, and it mainly targets code.…”
Section: Introductionmentioning
confidence: 99%