Abstract | ||
---|---|---|
Obfuscation is gaining momentum as a protection mech- anism for the intellectual property contained within or en- capsulated by software. Usually, one of the following three directions is followed: source code obfuscation is achieved through source code transformations, Java bytecode obfus- cation through transformations on the bytecode, and binary obfuscation through binary rewriting. In this paper, we study the effectiveness of source code transformations for binary obfuscation. The transformations applied by several existing source code obfuscators are empirically shown to have no impact on the stripped binary after compilation. Subsequently, we study which source code transformations are robust enough to percolate through the compiler into the binary. |
Year | Venue | Keywords |
---|---|---|
2006 | Software Engineering Research and Practice | source and binary obfuscation,program transformations,intellectual property,software security,source code |
Field | DocType | Citations |
Programming language,Computer science,Software security assurance,Source code,Real-time computing,Obfuscation (software),Intellectual property,Obfuscation,Binary number | Conference | 11 |
PageRank | References | Authors |
0.56 | 16 | 6 |
Name | Order | Citations | PageRank |
---|---|---|---|
Matias Madou | 1 | 269 | 13.31 |
Bertrand Anckaert | 2 | 197 | 10.90 |
Bruno De Bus | 3 | 199 | 10.70 |
Koen De Bosschere | 4 | 1659 | 117.74 |
Jan Cappaert | 5 | 44 | 2.14 |
Bart Preneel | 6 | 6249 | 695.32 |