Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 226,199,000 papers from all fields of science
Search
Sign In
Create Free Account
Opaque predicate
In computer programming, an opaque predicate is a predicate—an expression that evaluates to either "true" or "false"—for which the outcome is known…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
6 relations
Broader (1)
Computer programming
Control flow
Dataflow
Predicate (mathematical logic)
Reverse engineering
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2018
2018
Stealthy Opaque Predicates in Hardware - Obfuscating Constant Expressions at Negligible Overhead
Max Hoffmann
,
C. Paar
IACR Trans. Cryptogr. Hardw. Embed. Syst.
2018
Corpus ID: 46937705
Opaque predicates are a well-established fundamental building block for software obfuscation. Simplified, an opaque predicate…
Expand
2017
2017
Opaque Predicate Detection by Static Analysis of Binary Executables
R. Prakash
,
P. P. Amritha
,
M. Sethumadhavan
International Symposium on Security in Computing…
2017
Corpus ID: 3604150
Opaque Predicates are one of the most covert methods employed by obfuscators to mitigate the risk of reverse engineering of code…
Expand
2017
2017
A parameterized flattening control flow based obfuscation algorithm with opaque predicate for reduplicate obfuscation
Zheheng Liang
,
Wenlin Li
,
Jing Guo
,
Deyu Qi
,
Jijun Zeng
IEEE International Conference on Progress in…
2017
Corpus ID: 21714362
In order to enhance the white box security of software, we proposed a reduplicate code obfuscation algorithm to protect the…
Expand
2014
2014
The Research of Multi-point Function Opaque Predicates Obfuscation Algorithm
Y. Yubo
,
Wenqing Fan
,
Huang Wei
,
Xu Guoai
,
Yi-xian Yang
2014
Corpus ID: 121263605
On the algorithm of code obfuscation, opaque predicate is used to confuse the judgment of the program branches to achieve complex…
Expand
2014
2014
Реализация запутывающих преобразований в компиляторной инфраструктуре LLVM
В. П. Иванников
,
Шамиль Курмангалеев
,
+4 authors
Арутюн Аветисян
2014
Corpus ID: 56364857
The paper describes the methods for obfuscating C/C++ programs to prevent applying static analyzers to them. The methods are…
Expand
2011
2011
Intellectual property protection (IPP) using obfuscation in C, VHDL, and Verilog coding
U. Meyer-Bäse
,
E. Castillo
,
G. Botella
,
L. Parrilla
,
Antonio García
Defense + Commercial Sensing
2011
Corpus ID: 14537811
One of the big challenges in the design of embedded systems today is how to combine design reuse and intellectual property…
Expand
2010
2010
Watermarking Java Programs using Dummy Methods with Dynamically Opaque Predicates
Zaenal Akbar
arXiv.org
2010
Corpus ID: 36531310
Software piracy, the illegal using, copying, and resale of applications is a major concern for anyone develops software. Software…
Expand
2007
2007
Manufacture of a New Opaque Predicate for Java Programs
Zhang Hua
2007
Corpus ID: 123886830
Most of developers protect their Java programs by code obfuscation,and opaque predicates act as tools for obfuscating control…
Expand
2007
2007
Security through Targeted Diversification
Nessim Kisserli
,
J. Cappaert
,
B. Preneel
2007
Corpus ID: 3738334
Despite current software protection techniques, applications are still analysed, tampered with, and abused on a large scale…
Expand
2005
2005
Securing Mobile Agents Control Flow Using Opaque Predicates
A. Majumdar
,
C. Thomborson
International Conference on Knowledge-Based…
2005
Corpus ID: 15252571
Mobile agent technology is an evolving paradigm that combines the inherent characteristics of intelligent agents, namely…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE