Control code obfuscation by abstract interpretation

M Dalla Preda, R Giacobazzi - Third IEEE International …, 2005 - ieeexplore.ieee.org
Control code obfuscation is intended to prevent malicious reverse engineering of software
by masking the program control flow. These obfuscating transformations often rely on the …

Hiding information in completeness holes: New perspectives in code obfuscation and watermarking

R Giacobazzi - 2008 Sixth IEEE International Conference on …, 2008 - ieeexplore.ieee.org
In this paper we show how abstract interpretation, and more specifically completeness,
provides an adequate model for reasoning about code obfuscation and watermarking. The …

Deobfuscation: Reverse engineering obfuscated code

SK Udupa, SK Debray, M Madou - 12th Working Conference …, 2005 - ieeexplore.ieee.org
In recent years, code obfuscation has attracted attention as a low cost approach to improving
software security by making it difficult for attackers to understand the inner workings of …

Stealthy code obfuscation technique for software security

SM Darwish, SK Guirguis… - The 2010 International …, 2010 - ieeexplore.ieee.org
Code obfuscation, a tool converts a program into one that is functionally identical to the
original but which is much more difficult for attacker to understand is currently the most …

Software code obfuscation by hiding control flow information in stack

V Balachandran, S Emmanuel - 2011 IEEE International …, 2011 - ieeexplore.ieee.org
Software code released to the user has the risk of reverse engineering attacks. Obfuscation
is a technique in which the software code is transformed into a semantically equivalent form …

Slicing aided design of obfuscating transforms

S Drape, A Majumdar… - 6th IEEE/ACIS …, 2007 - ieeexplore.ieee.org
An obfuscation aims to transform a program, without affecting its functionality, so that some
secret information within the program can be hidden for as long as possible from an …

Semantics-based code obfuscation by abstract interpretation

M Dalla Preda, R Giacobazzi - Journal of Computer Security, 2009 - content.iospress.com
In recent years code obfuscation has attracted research interest as a promising technique for
protecting secret properties of programs. The basic idea of code obfuscation is to transform …

Function level control flow obfuscation for software security

V Balachandran, NW Keong… - … Conference on Complex …, 2014 - ieeexplore.ieee.org
Software released to the user has the risk of reverse engineering attacks. Software control
flow obfuscation is one of the techniques used to make the reverse engineering of software …

Semantic-based code obfuscation by abstract interpretation

M Dalla Preda, R Giacobazzi - … , ICALP 2005, Lisbon, Portugal, July 11-15 …, 2005 - Springer
In this paper we introduce a semantic-based approach for code obfuscation. The aim of
code obfuscation is to prevent malicious users to disclose properties of the original source …

A generic approach to automatic deobfuscation of executable code

B Yadegari, B Johannesmeyer… - … IEEE Symposium on …, 2015 - ieeexplore.ieee.org
Malicious software are usually obfuscated to avoid detection and resist analysis. When new
malware is encountered, such obfuscations have to be penetrated or removed (" …