2006
DOI: 10.1007/11961635_26
|View full text |Cite
|
Sign up to set email alerts
|

A Survey of Control-Flow Obfuscations

Abstract: Abstract. In this short survey, we provide an overview of obfuscation and then shift our focus to outlining various non-trivial control-flow obfuscation techniques. Along the way, we highlight two transforms having provable security properties: the dispatcher model and opaque predicates. We comment on the strength and weaknesses of these transforms and outline difficulties associated in generating generalised classes of these.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
15
0
2

Year Published

2007
2007
2024
2024

Publication Types

Select...
4
3
2

Relationship

2
7

Authors

Journals

citations
Cited by 25 publications
(17 citation statements)
references
References 6 publications
0
15
0
2
Order By: Relevance
“…Control flow graph obfuscation is also a widely studied technique ( [26], [4], [17]). In this article, we are interested in the protection of the binary executable, and we refer to it as the machine code, simply the code, or the assembly.…”
Section: State-of-the-artmentioning
confidence: 99%
“…Control flow graph obfuscation is also a widely studied technique ( [26], [4], [17]). In this article, we are interested in the protection of the binary executable, and we refer to it as the machine code, simply the code, or the assembly.…”
Section: State-of-the-artmentioning
confidence: 99%
“…Some prevent automatic decompilation [2], [3]. Some obfuscate data flow [4], [5] or control flow [3], [4], [6], [7], [8], [9], [10], [11]. Others simply omit humanreadable, meaningful identifiers [2], [12].…”
Section: Introductionmentioning
confidence: 99%
“…The goal of software protection through code obfuscation is to transform the source code of an application to the point that it becomes unintelligible to automated program comprehension and analysis tools [13]. The motivation for obfuscating code arises from the problem of software piracy.…”
Section: Introductionmentioning
confidence: 99%