Proceedings of the 3rd ACM Workshop on Digital Rights Management 2003
DOI: 10.1145/947380.947399
|View full text |Cite
|
Sign up to set email alerts
|

Obfuscation of design intent in object-oriented applications

Abstract: Protection of digital data from unauthorized access is of paramount importance. In the past several years, much research has concentrated on protecting data from the standpoint of confidentiality, integrity and availability. Software is a form of data with unique properties and its protection poses unique challenges. First, software can be reverse engineered, which may result in stolen intellectual property. Second, software can be altered with the intent of performing operations this software must not be allo… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
32
0
1

Year Published

2005
2005
2015
2015

Publication Types

Select...
5
3
2

Relationship

0
10

Authors

Journals

citations
Cited by 37 publications
(33 citation statements)
references
References 14 publications
0
32
0
1
Order By: Relevance
“…Sosonkin et al propose obfuscations of object-oriented programs 21) . In their paper they propose three obfuscation techniques, i.e., class coalescing, class splitting, and type hiding.…”
Section: Related Workmentioning
confidence: 99%
“…Sosonkin et al propose obfuscations of object-oriented programs 21) . In their paper they propose three obfuscation techniques, i.e., class coalescing, class splitting, and type hiding.…”
Section: Related Workmentioning
confidence: 99%
“…• Obfuscation techniques like identifier renaming [4], class coalescing and class splitting [5] which rely on the difficulty that in the presence of method-overloading, precisely determining if there exists an execution path in a program for which a given reference points to a given method at a point of the program execution is NP-complete [6], [7]. Even though these obfuscation techniques are based on intractable computational problems, we do not know, in practice, how to arbitrarily generate sufficiently hard obfuscated problem instances such that all program analysis techniques would fail (i.e.…”
Section: Introductionmentioning
confidence: 99%
“…시장 조사 기관 IDC에 따르면 안드로이드 운영체제의 2014년 선적량 기준 시장 점유율은 81.5%로 세계 1위이자 압도적인 시장 지배력을 가지 고 있다 [3] . [10,12] . 에 널리 이용되고 있는 난독화 도구인 프로가드 [14] 와 JODE [15] , RetroGuard [16] , jarg [17] , yGuard [18] 는 메소 드, 클래스 식별자 변환 기법을 지원하고, 도구에 따 라 필드 등 추가적인 식별자 변환 기법을 지원하기도 한다.…”
unclassified