2001
DOI: 10.1007/3-540-45439-x_10
|View full text |Cite
|
Sign up to set email alerts
|

An Approach to the Obfuscation of Control-Flow of Sequential Computer Programs

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
54
0
1

Year Published

2003
2003
2018
2018

Publication Types

Select...
4
4

Relationship

1
7

Authors

Journals

citations
Cited by 78 publications
(57 citation statements)
references
References 13 publications
0
54
0
1
Order By: Relevance
“…The theoretical literature on software obfuscation appears somewhat contradictory. The np-hardness results of Wang [27] and pspace-hardness results of Chowet al [10] provide theoretical evidence that code transformations can massively increase the difficulty of reverse-engineering. In contrast, the impossibility results of Barak et al [3], essentially show that a software virtual black box generator, which can protect every program's code from revealing more than the program's input-output behavior reveals, cannot exist.…”
Section: Introduction and Overviewmentioning
confidence: 99%
“…The theoretical literature on software obfuscation appears somewhat contradictory. The np-hardness results of Wang [27] and pspace-hardness results of Chowet al [10] provide theoretical evidence that code transformations can massively increase the difficulty of reverse-engineering. In contrast, the impossibility results of Barak et al [3], essentially show that a software virtual black box generator, which can protect every program's code from revealing more than the program's input-output behavior reveals, cannot exist.…”
Section: Introduction and Overviewmentioning
confidence: 99%
“…On the side showing promise for software obfuscation are np-hardness results of C. Wang [52] (see also the earlier report [51]), the related results of Ogiso [43], and pspace-hardness results of Chow et al [15]. These suggest that one may expect code transformations to significantly (e.g.…”
Section: Positive and Negative Theoretical Resultsmentioning
confidence: 89%
“…Many automatic code obfuscation tools are available nowadays both for commercial (e.g. Semantic Designs Inc.'s C obfuscator (Semantic Designs 2016), Stunnix's obfuscators (Stunnix 2016), Diablo (Maebe and Sutter 2006)) and research purposes (Chow et al 2001;Schulze and Meyer 2013;Madou et al 2006;Necula et al 2002).…”
Section: Obfuscation and Deobfuscationmentioning
confidence: 99%