2009
DOI: 10.3233/jcs-2009-0345
|View full text |Cite
|
Sign up to set email alerts
|

Semantics-based code obfuscation by abstract interpretation

Abstract: In recent years code obfuscation has attracted research interest as a promising technique for protecting secret properties of programs. The basic idea of code obfuscation is to transform programs in order to hide their sensitive information while preserving their functionality. One of the major drawbacks of code obfuscation is the lack of a rigorous theoretical framework that makes it difficult to formally analyze and certify the effectiveness of obfuscating techniques. We face this problem by providing a form… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
18
0

Year Published

2012
2012
2020
2020

Publication Types

Select...
5
2

Relationship

2
5

Authors

Journals

citations
Cited by 39 publications
(18 citation statements)
references
References 35 publications
(51 reference statements)
0
18
0
Order By: Relevance
“…Software watermarking is useful in identifying a violation once it has happened, while code obfuscation is considered a promising technique to prevent malicious attacks. In recent years, code obfuscation has attracted the attention of many researchers and this has led to the design and implementation of many obfuscation strategies (e.g., [7,18,33,34,40]) together with the study of theoretical models and frameworks for understanding the potentialities and limits of obfuscation (e.g., [2,4,16,21,25,39]).…”
Section: Introductionmentioning
confidence: 99%
See 3 more Smart Citations
“…Software watermarking is useful in identifying a violation once it has happened, while code obfuscation is considered a promising technique to prevent malicious attacks. In recent years, code obfuscation has attracted the attention of many researchers and this has led to the design and implementation of many obfuscation strategies (e.g., [7,18,33,34,40]) together with the study of theoretical models and frameworks for understanding the potentialities and limits of obfuscation (e.g., [2,4,16,21,25,39]).…”
Section: Introductionmentioning
confidence: 99%
“…This example shows us that, in order to formally reason on what is protected, namely what is concealed, and what is preserved, namely what is revealed, by an obfuscating transformation, we need to focus on the effects that obfuscation has on the program semantics. In [14,16] it is shown that the semantic level allows us to understand the protection capabilities and the limits of an obfuscating strategy with respect to a particular program. We start from the approach of Dalla Preda and Giacobazzi in [14,16] (then developed also in [20,21]), where a formal framework for code obfuscation is provided by taking into account the effects that an obfuscating transformation has on trace semantics, and by modeling attackers as approximations of trace semantics.…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations
“…As suggestions to secure implementation, we used !le name and path name obfuscations to prevent hack attacks [27]. In a preliminary version of our code, the hacker could employ !le-name and !le-path to access the sequence strips and then based on a simple routine to try the permutations.…”
Section: Implementation Issues and Securing Ncsl Codementioning
confidence: 99%