The current state of art in program obfuscations:definitions of obfuscation security
Program obfuscation is a semantic-preserving transformation aimed at bringing a program into such a form, which impedes the understanding of its algorithm and data structures or prevents extracting of some valuable information from the text of a program. Since obfuscation could find wide use in comp...
| Published in: | Труды Института системного программирования РАН |
|---|---|
| Main Authors: | N. P. Varnovsky, V. A. Zakharov, N. N. Kuzurin, V. A. Shokurov |
| Format: | Article |
| Language: | English |
| Published: |
Russian Academy of Sciences, Ivannikov Institute for System Programming
2018-10-01
|
| Subjects: | |
| Online Access: | https://ispranproceedings.elpub.ru/jour/article/view/810 |
Similar Items
Description of the approach to development of the obfuscating compiler
by: Sh. F. Kurmangaleev, et al.
Published: (2018-10-01)
by: Sh. F. Kurmangaleev, et al.
Published: (2018-10-01)
Building an obfuscation compiler based on LLVM infrastructure
by: V. P. Korchagin, et al.
Published: (2018-10-01)
by: V. P. Korchagin, et al.
Published: (2018-10-01)
Syntactical characterization of nondeterministic logspace complexity class
by: D. A. Nosov
Published: (2018-10-01)
by: D. A. Nosov
Published: (2018-10-01)
Implementing Obfuscating Transformations in the LLVM Compiler Infrastructure
by: Victor Ivannikov, et al.
Published: (2018-10-01)
by: Victor Ivannikov, et al.
Published: (2018-10-01)
Способ количественного сравнения обфусцирующих преобразований
by: Petr Borisov, et al.
Published: (2024-05-01)
by: Petr Borisov, et al.
Published: (2024-05-01)
Алгоритм вычисления похожести графов и его применение для сравнения бинарных исполняемых файлов
by: Petr Borisov, et al.
Published: (2025-10-01)
by: Petr Borisov, et al.
Published: (2025-10-01)
The Application of Compiler-based Obfuscation and Diversification for Program Signature Modification
by: A. R. Nurmukhametov
Published: (2018-10-01)
by: A. R. Nurmukhametov
Published: (2018-10-01)
Dynamic analysis of virtualization- and dispatching-obfuscated applications
by: M. G. Bakulin, et al.
Published: (2018-10-01)
by: M. G. Bakulin, et al.
Published: (2018-10-01)
FEATURES OF TESTING OF COMMERCIAL ELECTRICITY METERING SYSTEM
by: Oksana S. Mezentceva, et al.
Published: (2022-09-01)
by: Oksana S. Mezentceva, et al.
Published: (2022-09-01)
Polynomial time algorithm for checking strong equivalence of program
by: V. A. Zakharov, et al.
Published: (2018-10-01)
by: V. A. Zakharov, et al.
Published: (2018-10-01)
Polynomial time algorithm for checking strong equivalence of program
by: T. A. Novikova, et al.
Published: (2018-10-01)
by: T. A. Novikova, et al.
Published: (2018-10-01)
A note on the concept of obfuscation.
by: N.P. Varnovsky
Published: (2004-01-01)
by: N.P. Varnovsky
Published: (2004-01-01)
Двусторонняя унификация программ и ее применение для задач рефакторинга
by: T. A. Novikova, et al.
Published: (2018-10-01)
by: T. A. Novikova, et al.
Published: (2018-10-01)
A polynomial algorithm for checking the equivalence in models of programs with commutation and vast operators
by: V. V. Podymov, et al.
Published: (2018-10-01)
by: V. V. Podymov, et al.
Published: (2018-10-01)
Comparing complexities of problems of determining of Grebner’s basis of ideal and solving this ideal
by: A. V. Shokurov
Published: (2018-10-01)
by: A. V. Shokurov
Published: (2018-10-01)
Modeling and analysis of the behavior of successive reactive programs
by: V. A. Zakharov
Published: (2018-10-01)
by: V. A. Zakharov
Published: (2018-10-01)
SELF-LEARNING OF COMPUTER PROGRAMS FOR CONTROLLING TEST TASKS EXECUTION OF CALCULATED TYPE
by: Oleksandr O. Petkov
Published: (2015-03-01)
by: Oleksandr O. Petkov
Published: (2015-03-01)
Software deobfuscation methods: analysis and implementation
by: Sh. F. Kurmangaleev, et al.
Published: (2018-10-01)
by: Sh. F. Kurmangaleev, et al.
Published: (2018-10-01)
Program obfuscation as obstruction of program static analysis.
by: K.S. Ivanov, et al.
Published: (2004-01-01)
by: K.S. Ivanov, et al.
Published: (2004-01-01)
RESEARCH OF DYNAMIC MODEL AIR FIELD HARVESTER
by: A.V. KORCHAGIN
Published: (2018-10-01)
by: A.V. KORCHAGIN
Published: (2018-10-01)
Philological obfuscation
by: Chris Ellis
Published: (2009-06-01)
by: Chris Ellis
Published: (2009-06-01)
Secure obfuscation for encrypted threshold signatures
by: Yahong LI, et al.
Published: (2020-06-01)
by: Yahong LI, et al.
Published: (2020-06-01)
Secure obfuscation for encrypted threshold signatures
by: Yahong LI, et al.
Published: (2020-06-01)
by: Yahong LI, et al.
Published: (2020-06-01)
Об оценке параметров трехмерной равномерно-регрессионной модели
by: Игорь Викторович Пономарев
Published: (2020-09-01)
by: Игорь Викторович Пономарев
Published: (2020-09-01)
DEFINITION OF COMPLEXITY OF TASKS AT THE CONTROL OF MASTERING OF LINGUISTIC EXPRESSIONS
by: Oleksandr O. Petkov, et al.
Published: (2014-03-01)
by: Oleksandr O. Petkov, et al.
Published: (2014-03-01)
Контроль химической деструкции материала стеновой керамикис учетом параметров эксплуатации конструкции
by: Vladimir Erofeev, et al.
Published: (2024-09-01)
by: Vladimir Erofeev, et al.
Published: (2024-09-01)
A Security Analysis of Circuit Clock Obfuscation
by: Rajesh Datta, et al.
Published: (2022-08-01)
by: Rajesh Datta, et al.
Published: (2022-08-01)
GDOM: Granulometry for the Detection of Obfuscated Malware
by: John A. Aruta, et al.
Published: (2020-01-01)
by: John A. Aruta, et al.
Published: (2020-01-01)
The Obfuscated Network Steganography
by: da-Chih Lin, et al.
Published: (2025-01-01)
by: da-Chih Lin, et al.
Published: (2025-01-01)
VIRTUAL SYSTEM OBFUSCATION
by: Michal HULIČ, et al.
Published: (2019-12-01)
by: Michal HULIČ, et al.
Published: (2019-12-01)
Athematical model of the complex dynamic system "perturbation influences-machine- operator"
by: P. A. Korchagin, et al.
Published: (2017-08-01)
by: P. A. Korchagin, et al.
Published: (2017-08-01)
Анализ и моделирование уязвимостей безопасности информационных систем
by: Б. С. Самандаров, et al.
Published: (2025-03-01)
by: Б. С. Самандаров, et al.
Published: (2025-03-01)
Virtual machines and models in training to use of modern hardware-software computer's complexes
by: V V Grinshkun, et al.
Published: (2010-06-01)
by: V V Grinshkun, et al.
Published: (2010-06-01)
Review of path branch obfuscation
by: Pu GENG, et al.
Published: (2020-04-01)
by: Pu GENG, et al.
Published: (2020-04-01)
Побудова математичної моделі друкарського контакту ротаційної тамподрукарської машини
by: О. М. Віхоть
Published: (2008-03-01)
by: О. М. Віхоть
Published: (2008-03-01)
An Approach to Reconstruction of Control Flow of an Obfuscated Program
by: Ilya N. Ledovskikh, et al.
Published: (2018-10-01)
by: Ilya N. Ledovskikh, et al.
Published: (2018-10-01)
QUICK SEARCH OF The shortest paths on the graph WITH A PREDETERMINED DECISION
by: M. P. Revotjuk, et al.
Published: (2019-06-01)
by: M. P. Revotjuk, et al.
Published: (2019-06-01)
COMPLEXITY EVALUATION IN THE PROJECTS INVOLVING MOBILE HETEROGENEOUS OBJECTS
by: A. I. Kuzmich, et al.
Published: (2019-06-01)
by: A. I. Kuzmich, et al.
Published: (2019-06-01)
Secure Route-Obfuscation Mechanism with Information-Theoretic Security for Internet of Things
by: Abid Rauf, et al.
Published: (2020-07-01)
by: Abid Rauf, et al.
Published: (2020-07-01)
Assessment of Stability Cycle and Processes within Effective Development Enterprises Оценка устойчивости циклов и процессов в рамках эффективного развития предприятий
by: Gontareva Irina V.
Published: (2011-02-01)
by: Gontareva Irina V.
Published: (2011-02-01)
Similar Items
-
Description of the approach to development of the obfuscating compiler
by: Sh. F. Kurmangaleev, et al.
Published: (2018-10-01) -
Building an obfuscation compiler based on LLVM infrastructure
by: V. P. Korchagin, et al.
Published: (2018-10-01) -
Syntactical characterization of nondeterministic logspace complexity class
by: D. A. Nosov
Published: (2018-10-01) -
Implementing Obfuscating Transformations in the LLVM Compiler Infrastructure
by: Victor Ivannikov, et al.
Published: (2018-10-01) -
Способ количественного сравнения обфусцирующих преобразований
by: Petr Borisov, et al.
Published: (2024-05-01)
