Proceedings of the ACM SIGPLAN 2012 Workshop on Partial Evaluation and Program Manipulation 2012
DOI: 10.1145/2103746.2103761
|View full text |Cite
|
Sign up to set email alerts
|

Obfuscation by partial evaluation of distorted interpreters

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
44
0

Year Published

2012
2012
2023
2023

Publication Types

Select...
6
2
2

Relationship

1
9

Authors

Journals

citations
Cited by 29 publications
(44 citation statements)
references
References 24 publications
0
44
0
Order By: Relevance
“…Source code obfuscation is gaining an ever-growing level of importance in the secure software arena, affording both source code and binary protection in areas such as Intellectual Property (IP) and Digital Rights Management (DRM) [6]. The goal of source code obfuscation is to transform and obscure the program variables and the code lines to such a point where it becomes unintelligible to both automated and human reverse engineering efforts.…”
Section: Methodsmentioning
confidence: 99%
“…Source code obfuscation is gaining an ever-growing level of importance in the secure software arena, affording both source code and binary protection in areas such as Intellectual Property (IP) and Digital Rights Management (DRM) [6]. The goal of source code obfuscation is to transform and obscure the program variables and the code lines to such a point where it becomes unintelligible to both automated and human reverse engineering efforts.…”
Section: Methodsmentioning
confidence: 99%
“…It is interested to note that our formalisation of our online partial evaluator was influenced by a notion of closure [LS91] that has been used to formalise partial evaluators for logic programs; this suggests that the idea is not limited to one particular programming paradigm. Quite apart from its role in deobfuscation, partial evaluation can also be applied in obfuscation [GJM12]: a modified interpreter, that encapsulates an obfuscation technique, is partially evaluated with respect to the source program to automatically obfuscate the source.…”
Section: Related Workmentioning
confidence: 99%
“…We know of no partial evaluator for Jimple, though Soot represents the ideal environment for developing one [8]. Quite apart from its role in deob-fuscation, partial evaluation can also be applied in obfuscation [10]: a modified interpreter, that encapsulates an obfuscation technique, is partially evaluated with respect to the source program to automatically obfuscate the source. Program transformation has been proposed for deobfuscating binary programs [5], by unpacking and removing superfluous jumps and junk, again with the aim of improving AV scanning.…”
Section: Related Workmentioning
confidence: 99%