Obfuscation (software)

Known as: Obfuscator, Obfuscated code, Obfuscating software 
In software development, manual obfuscation is the deliberate act of creating obfuscated code, i.e. source or machine code that is difficult for… (More)
Wikipedia

Topic mentions per year

Topic mentions per year

1987-2017
05010015019872017

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2013
Highly Cited
2013
In this paper, we study of the notion of differing-input obfuscation, introduced by Barak et al. (CRYPTO 2001, JACM 2012). For… (More)
  • figure 2
Is this relevant?
Highly Cited
2013
Highly Cited
2013
The goal of general-purpose program obfuscation is to make an arbitrary computer program “unintelligible” while preserving its… (More)
  • figure 1
Is this relevant?
Highly Cited
2008
Highly Cited
2008
Malware programs that incorporate trigger-based behavior initiate malicious activities based on conditions satisfied only by… (More)
  • figure 1
  • figure 4
  • figure 5
  • figure 6
  • figure 8
Is this relevant?
Highly Cited
2007
Highly Cited
2007
An obfuscator is a compiler that transforms any program (which we will view in this work as a boolean circuit) into an obfuscated… (More)
Is this relevant?
Highly Cited
2007
Highly Cited
2007
Reverse engineering of software is the process of recovering higher-level structure and meaning from a lowerlevel program… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 5
  • figure 4
Is this relevant?
Highly Cited
2004
Highly Cited
2004
Informally, an obfuscator O is an efficient, probabilistic “compiler” that transforms a program P into a new program O(P ) with… (More)
Is this relevant?
Highly Cited
2003
Highly Cited
2003
Attacks which exploit memory programming errors (such as buffer overflows) are one of today’s most serious security threats… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2003
Highly Cited
2003
A great deal of software is distributed in the form of executable code. The ability to reverse engineer such executables can… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2001
Highly Cited
2001
We examine the competition between a group of Internet retailers who operate in an environment where a price search engine plays… (More)
  • figure 1
  • figure 2
  • figure 3
  • table I
  • table II
Is this relevant?
Highly Cited
2000
Highly Cited
2000
In this paper, we investigate the gap between auxiliary-input zero-knowledge (AIZK) and blackbox-simulation zero-knowledge (BSZK… (More)
Is this relevant?