2006
DOI: 10.1007/s11416-006-0029-6
|View full text |Cite
|
Sign up to set email alerts
|

On the possibility of practically obfuscating programs towards a unified perspective of code protection

Abstract: Barak et al. gave a first formalization of obfuscation, describing an obfuscator O as an efficient, probabilistic "compiler" that takes in input a program P and produces a new program O (P) that has the same functionality as P but is unintelligible. This means that any result an obfuscated program can compute is actually computable given only an input/output access (called oracle access) to the program P: we call such results trivial results. On the basis of this informal definition, they suggest a formal defi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
29
0
1

Year Published

2007
2007
2018
2018

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 43 publications
(30 citation statements)
references
References 10 publications
0
29
0
1
Order By: Relevance
“…To reconstruct such a primitive, we need to consider and combine multiple operations. As we do not conduct fine-grained taint analysis [1,6,14], we need to reassemble the memory based on its addresses, which can serve as a rough approximation.…”
Section: Fine-grained Dynamic Binary Instrumentationmentioning
confidence: 99%
“…To reconstruct such a primitive, we need to consider and combine multiple operations. As we do not conduct fine-grained taint analysis [1,6,14], we need to reassemble the memory based on its addresses, which can serve as a rough approximation.…”
Section: Fine-grained Dynamic Binary Instrumentationmentioning
confidence: 99%
“…Nowdays malware samples increasingly employ techniques such as polymorphism [2], metamorphism [1], packing, instruction virtualization, and emulation to bypass signatures and defeat attempts to analyze their inner mechanisms [20]. In order to remain effective, many Anti-Malware venders have turned their classic signaturebased method to cloud (server) based detection.…”
Section: Cloud Based Malware Detectionmentioning
confidence: 99%
“…Several recent Win32 PE malware are included in the test dataset for analysis such as Redgirl, Bancos, MSNBot and Viking. For each malware, we collect their variants generated by the malware authors applying the encryption and obfuscation techniques [4,5], like flow modification, data segment modification and insertion of dead code. These variants of the malware are not included in our training set.…”
Section: Variants Of Known Malware Detectionmentioning
confidence: 99%