Control flow based obfuscation

@inproceedings{Ge2005ControlFB,
  title={Control flow based obfuscation},
  author={Jun Ge and Soma Chaudhuri and Akhilesh Tyagi},
  booktitle={DRM '05},
  year={2005}
}
  • Jun Ge, Soma Chaudhuri, Akhilesh Tyagi
  • Published in DRM '05 2005
  • Computer Science
  • A software obfuscator is a program O to transform a source program P for protection against malicious reverse engineering. O should be correct (O(P) has same functionality with P), resilient (O(P) is resilient against attacks), and effective (O(P) is not too much slower than P). In this paper we describe the design of an obfuscator which consists of two parts. The first part extracts the control flow information from the program and saves it in another process named Monitor-process. The second… CONTINUE READING

    Create an AI-powered research feed to stay up to date with new papers like this posted to ArXiv

    Figures, Tables, and Topics from this paper.

    Citations

    Publications citing this paper.
    SHOWING 1-10 OF 36 CITATIONS

    Constructing secure MapReduce framework in cloud-based environment

    VIEW 5 EXCERPTS
    CITES METHODS & BACKGROUND
    HIGHLY INFLUENCED

    An Obfuscation-Based Approach against Injection Attacks

    VIEW 4 EXCERPTS
    CITES BACKGROUND
    HIGHLY INFLUENCED

    Securing Software Intellectual Property on Commodity and Legacy Embedded Systems

    VIEW 5 EXCERPTS
    CITES METHODS & BACKGROUND
    HIGHLY INFLUENCED

    Software code protection through software obfuscation.

    VIEW 10 EXCERPTS
    CITES BACKGROUND & METHODS
    HIGHLY INFLUENCED

    AntiFuzz: Impeding Fuzzing Audits of Binary Executables

    VIEW 3 EXCERPTS
    CITES METHODS

    Binary Obfuscation Based Reassemble

    VIEW 1 EXCERPT

    Cloud Security via Virtualized Out-of-Band Execution and Obfuscation

    VIEW 1 EXCERPT
    CITES METHODS

    References

    Publications referenced by this paper.
    SHOWING 1-3 OF 3 REFERENCES

    Preliminary Analysis of the Security of Control Flow Code Transformations

    • Vladimir Zakharov
    • Cloakware & Code Transformations Report, Cloakware and the Institute of Systems Programming of the Russian Academy of Science
    • 2001
    VIEW 7 EXCERPTS
    HIGHLY INFLUENTIAL

    Watermarking, Tamper-Proofing, and Obfuscation-Tools for Software Protection

    VIEW 6 EXCERPTS
    HIGHLY INFLUENTIAL