The Obfuscation Executive View Full Text


Ontology type: schema:Chapter     


Chapter Info

DATE

2004

AUTHORS

Kelly Heffner , Christian Collberg

ABSTRACT

Code obfuscations are semantics-preserving code transformations used to protect a program from reverse engineering. There is generally no expectation of complete, long-term, protection. Rather, there is a trade-off between the protection afforded by an obfuscation (i.e. the amount of resources an adversary has to expend to overcome the layer of confusion added by the transformation) and the resulting performance overhead. In this paper we examine the problems that arise when constructing an Obfuscation Executive. This is the main loop in charge of a) selecting the part of the application to be obfuscated next, b) choosing the best transformation to apply to this part, c) evaluating how much confusion and overhead has been added to the application, and d) deciding when the obfuscation process should terminate. More... »

PAGES

428-440

References to SciGraph publications

  • 2001. On the (Im)possibility of Obfuscating Programs in ADVANCES IN CRYPTOLOGY — CRYPTO 2001
  • Book

    TITLE

    Information Security

    ISBN

    978-3-540-23208-7
    978-3-540-30144-8

    Author Affiliations

    Identifiers

    URI

    http://scigraph.springernature.com/pub.10.1007/978-3-540-30144-8_36

    DOI

    http://dx.doi.org/10.1007/978-3-540-30144-8_36

    DIMENSIONS

    https://app.dimensions.ai/details/publication/pub.1029290335


    Indexing Status Check whether this publication has been indexed by Scopus and Web Of Science using the SN Indexing Status Tool
    Incoming Citations Browse incoming citations for this publication using opencitations.net

    JSON-LD is the canonical representation for SciGraph data.

    TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT

    [
      {
        "@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json", 
        "about": [
          {
            "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/0912", 
            "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
            "name": "Materials Engineering", 
            "type": "DefinedTerm"
          }, 
          {
            "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/09", 
            "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
            "name": "Engineering", 
            "type": "DefinedTerm"
          }
        ], 
        "author": [
          {
            "affiliation": {
              "alternateName": "University of Arizona", 
              "id": "https://www.grid.ac/institutes/grid.134563.6", 
              "name": [
                "Department of Computer Science, The University of Arizona"
              ], 
              "type": "Organization"
            }, 
            "familyName": "Heffner", 
            "givenName": "Kelly", 
            "type": "Person"
          }, 
          {
            "affiliation": {
              "alternateName": "University of Arizona", 
              "id": "https://www.grid.ac/institutes/grid.134563.6", 
              "name": [
                "Department of Computer Science, The University of Arizona"
              ], 
              "type": "Organization"
            }, 
            "familyName": "Collberg", 
            "givenName": "Christian", 
            "id": "sg:person.014743053154.57", 
            "sameAs": [
              "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.014743053154.57"
            ], 
            "type": "Person"
          }
        ], 
        "citation": [
          {
            "id": "https://doi.org/10.1145/292540.292569", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1004514909"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1145/857076.857090", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1008841634"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1145/113445.113456", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1010720879"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1145/268946.268962", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1022024311"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1145/99163.99179", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1022882024"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/3-540-44647-8_1", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1039594573", 
              "https://doi.org/10.1007/3-540-44647-8_1"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1109/msecp.2003.1219058", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1061421818"
            ], 
            "type": "CreativeWork"
          }
        ], 
        "datePublished": "2004", 
        "datePublishedReg": "2004-01-01", 
        "description": "Code obfuscations are semantics-preserving code transformations used to protect a program from reverse engineering. There is generally no expectation of complete, long-term, protection. Rather, there is a trade-off between the protection afforded by an obfuscation (i.e. the amount of resources an adversary has to expend to overcome the layer of confusion added by the transformation) and the resulting performance overhead. In this paper we examine the problems that arise when constructing an Obfuscation Executive. This is the main loop in charge of a) selecting the part of the application to be obfuscated next, b) choosing the best transformation to apply to this part, c) evaluating how much confusion and overhead has been added to the application, and d) deciding when the obfuscation process should terminate.", 
        "editor": [
          {
            "familyName": "Zhang", 
            "givenName": "Kan", 
            "type": "Person"
          }, 
          {
            "familyName": "Zheng", 
            "givenName": "Yuliang", 
            "type": "Person"
          }
        ], 
        "genre": "chapter", 
        "id": "sg:pub.10.1007/978-3-540-30144-8_36", 
        "inLanguage": [
          "en"
        ], 
        "isAccessibleForFree": false, 
        "isPartOf": {
          "isbn": [
            "978-3-540-23208-7", 
            "978-3-540-30144-8"
          ], 
          "name": "Information Security", 
          "type": "Book"
        }, 
        "name": "The Obfuscation Executive", 
        "pagination": "428-440", 
        "productId": [
          {
            "name": "dimensions_id", 
            "type": "PropertyValue", 
            "value": [
              "pub.1029290335"
            ]
          }, 
          {
            "name": "doi", 
            "type": "PropertyValue", 
            "value": [
              "10.1007/978-3-540-30144-8_36"
            ]
          }, 
          {
            "name": "readcube_id", 
            "type": "PropertyValue", 
            "value": [
              "8b891694f3e50f9d21ffa48c81d32f0f21188b50b10a6d79bf0d2f4d36dfac64"
            ]
          }
        ], 
        "publisher": {
          "location": "Berlin, Heidelberg", 
          "name": "Springer Berlin Heidelberg", 
          "type": "Organisation"
        }, 
        "sameAs": [
          "https://doi.org/10.1007/978-3-540-30144-8_36", 
          "https://app.dimensions.ai/details/publication/pub.1029290335"
        ], 
        "sdDataset": "chapters", 
        "sdDatePublished": "2019-04-16T08:22", 
        "sdLicense": "https://scigraph.springernature.com/explorer/license/", 
        "sdPublisher": {
          "name": "Springer Nature - SN SciGraph project", 
          "type": "Organization"
        }, 
        "sdSource": "s3://com-uberresearch-data-dimensions-target-20181106-alternative/cleanup/v134/2549eaecd7973599484d7c17b260dba0a4ecb94b/merge/v9/a6c9fde33151104705d4d7ff012ea9563521a3ce/jats-lookup/v90/0000000363_0000000363/records_70031_00000001.jsonl", 
        "type": "Chapter", 
        "url": "https://link.springer.com/10.1007%2F978-3-540-30144-8_36"
      }
    ]
     

    Download the RDF metadata as:  json-ld nt turtle xml License info

    HOW TO GET THIS DATA PROGRAMMATICALLY:

    JSON-LD is a popular format for linked data which is fully compatible with JSON.

    curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/pub.10.1007/978-3-540-30144-8_36'

    N-Triples is a line-based linked data format ideal for batch operations.

    curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/pub.10.1007/978-3-540-30144-8_36'

    Turtle is a human-readable linked data format.

    curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/pub.10.1007/978-3-540-30144-8_36'

    RDF/XML is a standard XML format for linked data.

    curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/pub.10.1007/978-3-540-30144-8_36'


     

    This table displays all metadata directly associated to this object as RDF triples.

    98 TRIPLES      23 PREDICATES      34 URIs      20 LITERALS      8 BLANK NODES

    Subject Predicate Object
    1 sg:pub.10.1007/978-3-540-30144-8_36 schema:about anzsrc-for:09
    2 anzsrc-for:0912
    3 schema:author N031b302423af4dafa61dfaf253a584fa
    4 schema:citation sg:pub.10.1007/3-540-44647-8_1
    5 https://doi.org/10.1109/msecp.2003.1219058
    6 https://doi.org/10.1145/113445.113456
    7 https://doi.org/10.1145/268946.268962
    8 https://doi.org/10.1145/292540.292569
    9 https://doi.org/10.1145/857076.857090
    10 https://doi.org/10.1145/99163.99179
    11 schema:datePublished 2004
    12 schema:datePublishedReg 2004-01-01
    13 schema:description Code obfuscations are semantics-preserving code transformations used to protect a program from reverse engineering. There is generally no expectation of complete, long-term, protection. Rather, there is a trade-off between the protection afforded by an obfuscation (i.e. the amount of resources an adversary has to expend to overcome the layer of confusion added by the transformation) and the resulting performance overhead. In this paper we examine the problems that arise when constructing an Obfuscation Executive. This is the main loop in charge of a) selecting the part of the application to be obfuscated next, b) choosing the best transformation to apply to this part, c) evaluating how much confusion and overhead has been added to the application, and d) deciding when the obfuscation process should terminate.
    14 schema:editor N853a04ba028741a898021ac8520c9274
    15 schema:genre chapter
    16 schema:inLanguage en
    17 schema:isAccessibleForFree false
    18 schema:isPartOf N09c43a16480f44e3ae81479d50ae0b87
    19 schema:name The Obfuscation Executive
    20 schema:pagination 428-440
    21 schema:productId N3a92826611e44644a99aa88b0d0b4dcf
    22 N911f675b43cc4b22bd635cd01fb35682
    23 Nbe45e98f2f154b3aa225124e5afe0471
    24 schema:publisher N09c760a818e94c76a32a62a529d54b14
    25 schema:sameAs https://app.dimensions.ai/details/publication/pub.1029290335
    26 https://doi.org/10.1007/978-3-540-30144-8_36
    27 schema:sdDatePublished 2019-04-16T08:22
    28 schema:sdLicense https://scigraph.springernature.com/explorer/license/
    29 schema:sdPublisher N393e9f332fa3405182853edd5bff21d3
    30 schema:url https://link.springer.com/10.1007%2F978-3-540-30144-8_36
    31 sgo:license sg:explorer/license/
    32 sgo:sdDataset chapters
    33 rdf:type schema:Chapter
    34 N031b302423af4dafa61dfaf253a584fa rdf:first N88825c534e0d4e72a7b3c77a5af4b6f9
    35 rdf:rest N109afe73e44d43a4adac694005703221
    36 N09c43a16480f44e3ae81479d50ae0b87 schema:isbn 978-3-540-23208-7
    37 978-3-540-30144-8
    38 schema:name Information Security
    39 rdf:type schema:Book
    40 N09c760a818e94c76a32a62a529d54b14 schema:location Berlin, Heidelberg
    41 schema:name Springer Berlin Heidelberg
    42 rdf:type schema:Organisation
    43 N0fa1ef42af1a4187948ead12527598e3 rdf:first Nb6596017f0394a08a9884bef267934bd
    44 rdf:rest rdf:nil
    45 N109afe73e44d43a4adac694005703221 rdf:first sg:person.014743053154.57
    46 rdf:rest rdf:nil
    47 N393e9f332fa3405182853edd5bff21d3 schema:name Springer Nature - SN SciGraph project
    48 rdf:type schema:Organization
    49 N3a92826611e44644a99aa88b0d0b4dcf schema:name readcube_id
    50 schema:value 8b891694f3e50f9d21ffa48c81d32f0f21188b50b10a6d79bf0d2f4d36dfac64
    51 rdf:type schema:PropertyValue
    52 N853a04ba028741a898021ac8520c9274 rdf:first Nee8d1a320a5d46adae17ba3632d552bc
    53 rdf:rest N0fa1ef42af1a4187948ead12527598e3
    54 N88825c534e0d4e72a7b3c77a5af4b6f9 schema:affiliation https://www.grid.ac/institutes/grid.134563.6
    55 schema:familyName Heffner
    56 schema:givenName Kelly
    57 rdf:type schema:Person
    58 N911f675b43cc4b22bd635cd01fb35682 schema:name doi
    59 schema:value 10.1007/978-3-540-30144-8_36
    60 rdf:type schema:PropertyValue
    61 Nb6596017f0394a08a9884bef267934bd schema:familyName Zheng
    62 schema:givenName Yuliang
    63 rdf:type schema:Person
    64 Nbe45e98f2f154b3aa225124e5afe0471 schema:name dimensions_id
    65 schema:value pub.1029290335
    66 rdf:type schema:PropertyValue
    67 Nee8d1a320a5d46adae17ba3632d552bc schema:familyName Zhang
    68 schema:givenName Kan
    69 rdf:type schema:Person
    70 anzsrc-for:09 schema:inDefinedTermSet anzsrc-for:
    71 schema:name Engineering
    72 rdf:type schema:DefinedTerm
    73 anzsrc-for:0912 schema:inDefinedTermSet anzsrc-for:
    74 schema:name Materials Engineering
    75 rdf:type schema:DefinedTerm
    76 sg:person.014743053154.57 schema:affiliation https://www.grid.ac/institutes/grid.134563.6
    77 schema:familyName Collberg
    78 schema:givenName Christian
    79 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.014743053154.57
    80 rdf:type schema:Person
    81 sg:pub.10.1007/3-540-44647-8_1 schema:sameAs https://app.dimensions.ai/details/publication/pub.1039594573
    82 https://doi.org/10.1007/3-540-44647-8_1
    83 rdf:type schema:CreativeWork
    84 https://doi.org/10.1109/msecp.2003.1219058 schema:sameAs https://app.dimensions.ai/details/publication/pub.1061421818
    85 rdf:type schema:CreativeWork
    86 https://doi.org/10.1145/113445.113456 schema:sameAs https://app.dimensions.ai/details/publication/pub.1010720879
    87 rdf:type schema:CreativeWork
    88 https://doi.org/10.1145/268946.268962 schema:sameAs https://app.dimensions.ai/details/publication/pub.1022024311
    89 rdf:type schema:CreativeWork
    90 https://doi.org/10.1145/292540.292569 schema:sameAs https://app.dimensions.ai/details/publication/pub.1004514909
    91 rdf:type schema:CreativeWork
    92 https://doi.org/10.1145/857076.857090 schema:sameAs https://app.dimensions.ai/details/publication/pub.1008841634
    93 rdf:type schema:CreativeWork
    94 https://doi.org/10.1145/99163.99179 schema:sameAs https://app.dimensions.ai/details/publication/pub.1022882024
    95 rdf:type schema:CreativeWork
    96 https://www.grid.ac/institutes/grid.134563.6 schema:alternateName University of Arizona
    97 schema:name Department of Computer Science, The University of Arizona
    98 rdf:type schema:Organization
     




    Preview window. Press ESC to close (or click here)


    ...