Obfuscation (software)

Known as: Obfuscator, Obfuscated code, Obfuscating software 
In software development, manual obfuscation is the deliberate act of creating obfuscated code, i.e. source or machine code that is difficult for… (More)
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2016
Highly Cited
2016
In this work, we study indistinguishability obfuscation and functional encryption for general circuits: Indistinguishability… (More)
Is this relevant?
Highly Cited
2015
Highly Cited
2015
Software security with respect to reverse-engineering is a challenging discipline that has been researched for several years and… (More)
  • table I
  • figure 1
  • figure 2
  • figure 3
  • figure 4
Is this relevant?
Highly Cited
2013
Highly Cited
2013
Recently, Garg, Gentry, Halevi, Raykova, Sahai, and Waters (FOCS 2013) constructed a general-purpose obfuscating compiler for NC1… (More)
Is this relevant?
Highly Cited
2012
Highly Cited
2012
In this paper, we study of the notion of differing-input obfuscation, introduced by Barak et al. (CRYPTO 2001, JACM 2012). For… (More)
  • figure 2
Is this relevant?
Highly Cited
2007
Highly Cited
2007
Reverse engineering of software is the process of recovering higher-level structure and meaning from a lower-level program… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 5
  • figure 4
Is this relevant?
Highly Cited
2007
Highly Cited
2007
An obfuscator is a compiler that transforms any program (which we will view in this work as a boolean circuit) into an obfuscated… (More)
Is this relevant?
Highly Cited
2005
Highly Cited
2005
We investigate the possibility of obfuscating point functions in the framework of Barak et al. from Crypto '01. A point function… (More)
Is this relevant?
Highly Cited
2004
Highly Cited
2004
Disassembly is the process of recovering a symbolic representation of a program's machine code instructions from its binary… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2003
Highly Cited
2003
A great deal of software is distributed in the form of executable code. The ability to reverse engineer such executables can… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2003
Highly Cited
2003
Attacks which exploit memory programming errors (such as buffer overflows) are one of today's most serious security threats… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?