Статья

Название статьи СОВРЕМЕННЫЕ МЕТОДЫ ОБФУСКАЦИИ ПРОГРАММ: СРАВНИТЕЛЬНЫЙ АНАЛИЗ И КЛАССИФИКАЦИЯ
Автор Н.П. Варновский, В.А. Захаров, Н.Н. Кузюрин, А.В. Шокуров
Рубрика РАЗДЕЛ III. ЗАЩИТА ИНФОРМАЦИОННЫХ ПРОЦЕССОВ В КОМПЬЮТЕРНЫХ СИСТЕМАХ
Месяц, год 04, 2007
Индекс УДК
DOI
Аннотация

Скачать в PDF

Ключевые слова
Библиографический список 1. Collberg C., Thomborson C., Low D. A taxonomy of obfuscating transformations // Tech. Report, N 148, Univ. of Auckland, 1997.
2. Barak B., Goldreich O., Impagliazzo R., Rudich S., Sahai A., Vedhan S., Yang K. On the (Im)possibility of obfuscating programs // Lecture Notes in Computer Science, v. 2139, 2001, p. 1-18.
3. Goldwasser S., Tauman Kalai Y. On the impossibility of obfuscation with auxiliary input // Proc. of the 46 th IEEE Symp. on Foundations of Computer Science, 2005, 553-562.
4. Hofheinz D., Malone-Lee J., Stam M. Obfuscation for cryptographic purposes // Lecture Notes in Computer Science, v. 4392, 2007, p. 214-232.
5. Lynn B., Prabhakaran M., Sahai A. Positive results and techniques for obfuscation // Lecture Notes in Computer Science, v. 3027, 2004, p. 20-39.
6. Adida B., Wikstrцm D. Obfuscated ciphertext mixing // IACR. Eprint Archive, N 394, 2005.
7. Varnovsky N.P. A note on the concept of obfuscation // Труды Института системного программирования, т. 6, 2004.
8. Wee H. On obfuscating point functions // Proc. of 37th ACM Symp. on Theory of Computing, 2005, p. 523-532.
9. Goldwasser, S., Rothblum G. On best-possible obfuscation // Lecture Notes in Computer Science, v. 4392, 2007, p. 253-272.
10. Varnovsky N.P., Zakharov V.A. On the possibility of provably secure obfuscating programs // Lecture Notes in Computer Science, v. 2890, 2003, p. 91-102.
11. Hohenberger S., Rothblum G. N., Shelat A., Vaikuntanathan V. Securely obfuscating reencryption // Lecture Notes in Computer Science, v. 4392, 2007, p. 233-252.
12. Collberg C, Thomborson C. Watermarking, tamper-proofing, and obfuscation - tools for software protection // IEEE Transactions on Software Engineering, v. 28, N 6, 2002.
13. D'Anna L., Matt B., Reisse A., Van Vleck T. , Schwab S., LeBlanc P. Self-protecting mobile agents obfuscation report // Report #03-015, Network Associates Laboratories, 2003.
14. Иванников В.П., Варновский Н.П., Захаров В.А., Кузюрин Н.Н., Шокуров А.В., Кононов А.Н., Калинин А.В. Методы информационной защиты проектных решений при изготовлении микроэлектронных схем // Известия ТРТУ. – 2005. – № 4(48). – С. 112-119.
15. Ostrovsky R., Skeith III W.E. Private searching on streaming data // Lecture Notes in Computer Science, v. 3621, 2005, p. 223-240.
16. Chess D., White S. An undetectable computer virus. // 2000 Virus Bulletin Conference, 2000.
17. Szor P., Ferrie P. Hunting for metamorphic // 2001 Virus Bulletin Conference, 2001, 123-144.
18. Goldreich O., Ostrovsky R.. Software protection and simulation on oblivious RAMs.// Journal of the ACM, v. 43, N 3, 1996, p.431-473.
19. Mana A., Pimentel A. An efficient software protection scheme // Proc. of the 16th Int. Conf. on Information Security, 2001, p. 385-401.
20. Zhang X. , Gupta R. Hiding program slices for software security // Proc. of the First Annual IEEE/ACM Int. Symp. on Code Generation and Optimization, 2003, p. 325-336.
21. Sander T., Tchudin C. On software protection via function hiding. // Lecture Notes in Computer Science, v. 1525, 1998.
22. Shokurov A.V. An approach to quantitative analysis of resistance of equivalent transformations of algebraic schemes // Труды Института системного программирования, 2004, т. 6.
23. Linn C., Debray S. Obfuscation of executable code to improve resistance to static disassembly // Proc. of the 10th ACM Conf. on Computer and Communications Security, Oct. 2003.
24. Stroulia E., Systa T. Dynamic analysis for reverse engineering and program understanding // ACM SIGAPP Applied Computing Review, v. 10, 2002, N 1, p. 8-17.
25. Heffner K., Collberg C. The obfuscation executives // Tech. Rep. TR 04-03, Dep. of computer science, Univ. of Arizona, USA, 2003.
26. Kruegel C., Robertson W., Valeur F., Vigna G. Static disassembly of obfuscated binaries // Proc. of USENIX Security, 2004, p. 255-270.
27. Udupa S. K., Madou M., Debray S. Deobfuscation: reverse engineering obfuscated code // Proc. of the 12th Working Conf. on Reverse Engineering, 2005, p. 45-54.
28. Madou M., Anckaert B., De Bus B., De Bosschere K., Cappaert J., Preneel B. On the effectiveness of source code transformations for binary obfuscation // Proc. of the Int. Conf. on Software Engineering Research and Practice (SERP06), June. 2006.
29. Wroblewski G. General method of program code obfuscation // Proc. of the Int. Conf. on Software Engineering Research and Practice (SERP), 2002, p.153-159.
30. Aushmith D. Tamper resistant software: an implementation // Lecture Notes in Computer Science, v. 1174, 1996, p.317-333.
31. Madou M., Anckaert B. , Moseley P., Debray S., De Sutter B., De Bosschere K. Software protection through dynamic code mutation // Information Security Applications, 2005, p. 371-385.
32. Wang C., Hill J., Knight J,. Davidson J. Software tamper resistance: obstructing static analysis of programs // Tech. Rep., N 12, Dep. of Comp. Sci., Univ. of Virginia, 2000.
33. Chow S., Gu Y., Johnson H., Zakharov V.A. An approach to the obfuscation of controlflow of sequential computer programs // Lecture Notes in Computer Science, v. 2200, 2001, p.144-155.
34. Чернов А.В. Анализ запутывающих преобразований программ // Труды Института системного программирования, Т. 3, 2002, – С. 137-163.
35. Чернов А. В. Интегрированная инструментальная среда Poirot для изучения методов маскировки программ // Препринт Института системного программирования РАН. - М.: ИСП РАН, 2003.
36. Ertaul L. Venkatesh S. Jhide – a toolkit for code obfuscation // Proc. of the 8th IASTED Int. Conf. on Software Engineering and Applications, 2004.
37. Madou M., van Put L., De Bosschere K. Understanding obfuscated code // Proc. of the 14th IEEE International Conf. on Program Comprehension, 2006, p. 268-274.
38. Hind M., Pioli A. Which pointer analysis should I use // Proc. of the 2000 ACM SIG-SOFT Int. Symp. on Software Testing and Analysis, 2000, p 113-123.
39. Horwitz S. Precise flow-insensitive may-alias analysis is NP-hard // University of Wisconsin-Madison, August 1996.
40. Collberg C., Thomborson C., Low D. C. Breaking abstractions and unstructuring data structures // Proc. of the 1998 Int. Conf. on Computer Languages, 1998, p. 28-38.
41. Ivanov K. S., Zakharov V. A. Program obfuscation as obstruction of program static analysis // Труды Института системного программировани, т. 6, 2004.
42. Sakabe Y., Soshi M., Miyaji A. Java obfuscation with a theoretical basis for building secure mobile agents // Proc. of the 7th IFIP Conf. on Communication and Multimedia Security, 2003.
43. Collberg C., Thomborson C., Low D. C. Manufacturing cheap, resilient and stealthy opaque constructs // Symp. on Principles of Programming Languages, 1998, p. 184-196.
44. Cousot P., Cousot R. An abstract interpretation based framework for software water-marking // Symp. on Principles of Programming Languages, 2003, p. 311-324.
45. Dalla Preda M., Giacobazzi R. Semantic-based code obfuscation by abstract interpretation // Lecture Notes in Computer Science, v. 3580, 2005, p. 1325-1336.
46. Dalla Preda M., Giacobazzi R., Madou M., de Bosschere B. Opaque predicate detection by means of abstract interpretations // Lecture Notes in Computer Science, v. 4019, 2006, p. 81-95.
47. Majumdar A., Thomborson C. Manufacturing opaque predicates in distributed systems for code obfuscation // Proc. of the 29th Australasian Computer Science Conf., 2006, p. 187-196.
48. Christodorescu M., Jha S., Seshia S.A., Song D., Bryant R.E. Semantic-aware malware detection // Proc. of the 2005 IEEE Symp.on Security and Privacy (Oakland 2005), 2005.
49. Dalla Preda M., Christodorescu M., Jha S.,Debray S. Semantic-based approach to malware detection // Proc. of the 34th Annual ACM SIGPLAN-SIGACT Symp.on Principles of Programming Languages, 2007, p. 377-388.
50. Варновский Н.П., Захаров В.А., Подловченко Р.И., Щербина В.С., Кузюрин Н.Н., Шокуров А.В. О применении методов деобфускации программ для обнаружения сложных
компьютерных вирусов // Известия ТРТУ.- 2006. - № 7(62). - С. 18-27.
51. Madou M., Anckaert B., De Sutter B., De Bosschere K. Hybrid static-dynamic attacks against software protection mechanisms // Proc. of the 5th ACM Workshop on Digital Rights Management, 2005, p. 75-82.
52. Collberg, C.S. Myles G., Huntwork A. Sandmark - a tool for software protection research // IEEE Security & Privacy, v. 1, N 4, 2003, p. 40-49.
53. Madou, M.; Van Put, L.; De Bosschere, K. Loco: an interactive code (de)obfuscation tool // Proc. of ACM SIGPLAN 2006 Workshop on Partial Evaluation and Program Manipulation, 2006.

Comments are closed.