The method of generation program code with indistinguishable functionality
The paper presents an obfuscation problem, in which indistinguishability is considered relatively to programs with distinguishable functionality. The functionality remains undisclosed owing to unknown parameters in the program’s input. An attacker that can run only polynomial time algorithms will no...
| Published in: | Безопасность информационных технологий |
|---|---|
| Main Author: | Mikhail Andreevich Styugin |
| Format: | Article |
| Language: | English |
| Published: |
Joint Stock Company "Experimental Scientific and Production Association SPELS
2017-04-01
|
| Subjects: | |
| Online Access: | https://bit.mephi.ru/index.php/bit/article/view/57 |
Similar Items
Block Cipher Based Public Key Encryption via Indistinguishability Obfuscation
by: Aleksandra Horubała, et al.
Published: (2018-05-01)
by: Aleksandra Horubała, et al.
Published: (2018-05-01)
Cryptanalysis on the HHSS Obfuscation Arising From Absence of Safeguards
by: Jung Hee Cheon, et al.
Published: (2018-01-01)
by: Jung Hee Cheon, et al.
Published: (2018-01-01)
A Framework to Quantify the Quality of Source Code Obfuscation
by: Hongjoo Jin, et al.
Published: (2024-06-01)
by: Hongjoo Jin, et al.
Published: (2024-06-01)
Code Obfuscation: A Comprehensive Approach to Detection, Classification, and Ethical Challenges
by: Tomer Raitsis, et al.
Published: (2025-01-01)
by: Tomer Raitsis, et al.
Published: (2025-01-01)
Enabling Search Over Encrypted Cloud Data With Concealed Search Pattern
by: Jing Yao, et al.
Published: (2018-01-01)
by: Jing Yao, et al.
Published: (2018-01-01)
Self-Bilinear Map from One Way Encoding System and <i>i𝒪</i>
by: Huang Zhang, et al.
Published: (2024-01-01)
by: Huang Zhang, et al.
Published: (2024-01-01)
Multi-Functional Homomorphic Encryption Method Based on Crowd Sensing Networks
by: Hui Chen, et al.
Published: (2025-01-01)
by: Hui Chen, et al.
Published: (2025-01-01)
Metrics for code obfuscation based on symbolic execution and N-scope complexity
by: Yuqiang XIAO, et al.
Published: (2022-12-01)
by: Yuqiang XIAO, et al.
Published: (2022-12-01)
Metrics for code obfuscation based on symbolic execution and N-scope complexity
by: Yuqiang XIAO, Yunfei GUO, Yawen WANG
Published: (2022-12-01)
by: Yuqiang XIAO, Yunfei GUO, Yawen WANG
Published: (2022-12-01)
VCF: Virtual Code Folding to Enhance Virtualization Obfuscation
by: Jae Hyuk Suk, et al.
Published: (2020-01-01)
by: Jae Hyuk Suk, et al.
Published: (2020-01-01)
Automatic Deobfuscation of VM-protected Programs
by: Evgenyi Ivanovich Goncharov
Published: (2013-02-01)
by: Evgenyi Ivanovich Goncharov
Published: (2013-02-01)
C Source code Obfuscation using Hash Function and Encryption Algorithm
by: Sarah Rosdiana Tambunan, et al.
Published: (2023-07-01)
by: Sarah Rosdiana Tambunan, et al.
Published: (2023-07-01)
Are our clone detectors good enough? An empirical study of code effects by obfuscation
by: Weihao Huang, et al.
Published: (2023-07-01)
by: Weihao Huang, et al.
Published: (2023-07-01)
On the Difficulty of FSM-based Hardware Obfuscation
by: Marc Fyrbiak, et al.
Published: (2018-08-01)
by: Marc Fyrbiak, et al.
Published: (2018-08-01)
Review of path branch obfuscation
by: Pu GENG, et al.
Published: (2020-04-01)
by: Pu GENG, et al.
Published: (2020-04-01)
Quantum Obfuscation of Generalized Quantum Power Functions with Coefficient
by: Yazhuo Jiang, et al.
Published: (2023-11-01)
by: Yazhuo Jiang, et al.
Published: (2023-11-01)
Author Obfuscation on Indonesian News Articles Using Genetic Algorithms
by: Rayhan Naufal Ramadhan, et al.
Published: (2021-04-01)
by: Rayhan Naufal Ramadhan, et al.
Published: (2021-04-01)
De la logique à l’algorithme : la traduction dans le design de programmes
by: Kim Sacks
Published: (2022-07-01)
by: Kim Sacks
Published: (2022-07-01)
Similarity-based Polymorphic Shellcode Detection
by: Denis Yurievich Gamayunov, et al.
Published: (2013-02-01)
by: Denis Yurievich Gamayunov, et al.
Published: (2013-02-01)
The Technique of Binary Code Decompilation and Its Application in Information Security Sphere
by: M. O. Shudrak, et al.
Published: (2012-12-01)
by: M. O. Shudrak, et al.
Published: (2012-12-01)
On the Automatic Analysis of the Practical Resistance of Obfusting Transformations
by: Petr D. Borisov, et al.
Published: (2019-09-01)
by: Petr D. Borisov, et al.
Published: (2019-09-01)
An obfuscate implementation for Android resources index table
by: Yang LIU, et al.
Published: (2016-10-01)
by: Yang LIU, et al.
Published: (2016-10-01)
An obfuscate implementation for Android resources index table
by: Yang LIU, et al.
Published: (2016-10-01)
by: Yang LIU, et al.
Published: (2016-10-01)
Unsupervised Text Style Transfer for Authorship Obfuscation in Bahasa Indonesia
by: Yunita Sari, et al.
Published: (2023-02-01)
by: Yunita Sari, et al.
Published: (2023-02-01)
Doppelganger Obfuscation — Exploring theDefensive and Offensive Aspects of Hardware Camouflaging
by: Max Hoffmann, et al.
Published: (2020-12-01)
by: Max Hoffmann, et al.
Published: (2020-12-01)
Protecting Encrypted Signature Functions Against Intrusions on Computing Devices by Obfuscation
by: Yang Shi, et al.
Published: (2016-01-01)
by: Yang Shi, et al.
Published: (2016-01-01)
Software watermarking scheme with cloud computing constraints
by: Guang SUN, et al.
Published: (2016-09-01)
by: Guang SUN, et al.
Published: (2016-09-01)
Trusted execution environments for quantum computers
by: Theodoros Trochatos, et al.
Published: (2025-06-01)
by: Theodoros Trochatos, et al.
Published: (2025-06-01)
Identifying obfuscated code through graph-based semantic analysis of binary code
by: Roxane Cohen, et al.
Published: (2025-09-01)
by: Roxane Cohen, et al.
Published: (2025-09-01)
A novel obfuscation method based on majority logic for preventing unauthorized access to binary deep neural networks
by: Alireza Mohseni, et al.
Published: (2025-07-01)
by: Alireza Mohseni, et al.
Published: (2025-07-01)
Android Authorship Attribution Using Source Code-Based Features
by: Emre Aydogan, et al.
Published: (2024-01-01)
by: Emre Aydogan, et al.
Published: (2024-01-01)
Evaluating Adversarial Robustness of Secret Key-Based Defenses
by: Ziad Tariq Muhammad Ali, et al.
Published: (2022-01-01)
by: Ziad Tariq Muhammad Ali, et al.
Published: (2022-01-01)
Incorporating contextual factors in agri-environmental research – options for obfuscation to support wider data application
by: P. Nowbakht, et al.
Published: (2025-10-01)
by: P. Nowbakht, et al.
Published: (2025-10-01)
Enhancing resilience in IoT cybersecurity: the roles of obfuscation and diversification techniques for improving the multilayered cybersecurity of IoT systems
by: Sampsa Rauti, et al.
Published: (2024-01-01)
by: Sampsa Rauti, et al.
Published: (2024-01-01)
Analisis Malware Aquvaprn.exe Untuk Investigasi Sistem Operasi Dengan Metode Memory Forensics
by: Hafish Naufal Aditya, et al.
Published: (2024-08-01)
by: Hafish Naufal Aditya, et al.
Published: (2024-08-01)
Maintaining environmental context and geoprivacy protection in agriculture
by: Parvaneh Nowbakht, et al.
Published: (2025-06-01)
by: Parvaneh Nowbakht, et al.
Published: (2025-06-01)
A Novel Probability-Based Logic-Locking Technique: ProbLock
by: Michael Yue, et al.
Published: (2021-12-01)
by: Michael Yue, et al.
Published: (2021-12-01)
A Security Analysis of Circuit Clock Obfuscation
by: Rajesh Datta, et al.
Published: (2022-08-01)
by: Rajesh Datta, et al.
Published: (2022-08-01)
RBP: a website fingerprinting obfuscation method against intelligent fingerprinting attacks
by: Tao Luo, et al.
Published: (2021-05-01)
by: Tao Luo, et al.
Published: (2021-05-01)
Modular relaxed indistinguishability and the aggregation problem
by: M. D. M. Bibiloni-Femenias, et al.
Published: (2024-07-01)
by: M. D. M. Bibiloni-Femenias, et al.
Published: (2024-07-01)
Similar Items
-
Block Cipher Based Public Key Encryption via Indistinguishability Obfuscation
by: Aleksandra Horubała, et al.
Published: (2018-05-01) -
Cryptanalysis on the HHSS Obfuscation Arising From Absence of Safeguards
by: Jung Hee Cheon, et al.
Published: (2018-01-01) -
A Framework to Quantify the Quality of Source Code Obfuscation
by: Hongjoo Jin, et al.
Published: (2024-06-01) -
Code Obfuscation: A Comprehensive Approach to Detection, Classification, and Ethical Challenges
by: Tomer Raitsis, et al.
Published: (2025-01-01) -
Enabling Search Over Encrypted Cloud Data With Concealed Search Pattern
by: Jing Yao, et al.
Published: (2018-01-01)
