Obfuscation by partial evaluation of distorted interpreters

R Giacobazzi, ND Jones, I Mastroeni - Proceedings of the ACM …, 2012 - dl.acm.org
How to construct a general program obfuscator? We present a novel approach to
automatically generating obfuscated code P2 from any program P whose source code is …

Maximal incompleteness as obfuscation potency

R Giacobazzi, I Mastroeni, M Dalla Preda - Formal Aspects of Computing, 2017 - Springer
Obfuscation is the art of making code hard to reverse engineer and understand. In this
paper, we propose a formal model for specifying and understanding the strength of …

Towards a formally verified obfuscating compiler

S Blazy, R Giacobazzi - SSP 2012-2nd ACM SIGPLAN Software …, 2012 - inria.hal.science
This paper extends the idea of specializing modified interpreters for systematically
generating obfuscated code. By using the Coq proof assistant we specify some elementary …

Semantics-based code obfuscation by abstract interpretation

M Dalla Preda, R Giacobazzi - Journal of Computer Security, 2009 - content.iospress.com
In recent years code obfuscation has attracted research interest as a promising technique for
protecting secret properties of programs. The basic idea of code obfuscation is to transform …

Making abstract interpretation incomplete: Modeling the potency of obfuscation

R Giacobazzi, I Mastroeni - … , SAS 2012, Deauville, France, September 11 …, 2012 - Springer
Recent studies on code protection showed that incompleteness, in the abstract interpretation
framework, has a key role in understanding program obfuscation. In particular, it is well …

Semantic-based code obfuscation by abstract interpretation

M Dalla Preda, R Giacobazzi - … , ICALP 2005, Lisbon, Portugal, July 11-15 …, 2005 - Springer
In this paper we introduce a semantic-based approach for code obfuscation. The aim of
code obfuscation is to prevent malicious users to disclose properties of the original source …

[PDF][PDF] Code obfuscation techniques for software protection

J Cappaert - Katholieke Universiteit Leuven, 2012 - esat.kuleuven.be
This thesis examines code obfuscation techniques to protect software against analysis and
unwanted modifications. Program obfuscation makes code harder to analyze. Indirectly, this …

The obfuscation executive

K Heffner, C Collberg - International Conference on Information Security, 2004 - Springer
Code obfuscations are semantics-preserving code transformations used to protect a
program from reverse engineering. There is generally no expectation of complete, long-term …

Intellectual property protection using obfuscation

S Drape - 2010 - ora.ox.ac.uk
In this technical report, we discuss the use of code obfuscation as means of protecting the
intellectual property of software. An obfuscation is a behaviour preserving program …

Control code obfuscation by abstract interpretation

M Dalla Preda, R Giacobazzi - Third IEEE International …, 2005 - ieeexplore.ieee.org
Control code obfuscation is intended to prevent malicious reverse engineering of software
by masking the program control flow. These obfuscating transformations often rely on the …