Sciweavers

81 search results - page 5 / 17
» On the (Im)possibility of Obfuscating Programs
Sort
View
IEEEIAS
2007
IEEE
15 years 3 months ago
Metrics-based Evaluation of Slicing Obfuscations
An obfuscation aims to transform a program, without affecting its functionality, so that some secret data within the program can be hidden for as long as possible from an adversar...
Anirban Majumdar, Stephen Drape, Clark D. Thombors...
61
Voted
DRMTICS
2005
Springer
15 years 3 months ago
Call Tree Transformation for Program Obfuscation and Copy Protection
In this paper we propose a new scheme for software obfuscation and license protection that is based on an original transformation of the program’s call tree. The idea is based on...
Valery Pryamikov
IEEEARES
2010
IEEE
15 years 4 months ago
Program Obfuscation by Strong Cryptography
—Program obfuscation is often employed by malware in order to avoid detection by anti-virus software, but it has many other legitimate uses, such as copy protection, software lic...
Zeljko Vrba, Pål Halvorsen, Carsten Griwodz
CC
2007
Springer
15 years 3 months ago
Obfuscating Java: The Most Pain for the Least Gain
Michael Batchelder, Laurie J. Hendren
DRM
2009
Springer
15 years 4 months ago
Obfuscating straight line arithmetic programs
Srivatsan Narayanan, Ananth Raghunathan, Ramarathn...