ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
Program Obfuscation via ABI Debiasing
Mapping Intimacies
◽
10.1145/3485832.3488017
◽
2021
◽
Author(s):
David Demicco
◽
Rukayat Erinfolami
◽
Aravind Prakash
Keyword(s):
Program Obfuscation
Download Full-text
Related Documents
Cited By
References
Towards Formal Verification of Program Obfuscation
2020 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW)
◽
10.1109/eurospw51379.2020.00091
◽
2020
◽
Author(s):
Weiyun Lu
◽
Bahman Sistany
◽
Amy Felty
◽
Philip Scott
Keyword(s):
Formal Verification
◽
Program Obfuscation
Download Full-text
Towards better program obfuscation
Proceedings of the 38th International Conference on Software Engineering Companion - ICSE '16
◽
10.1145/2889160.2891040
◽
2016
◽
Cited By ~ 2
Author(s):
Han Liu
Keyword(s):
Program Obfuscation
Download Full-text
Incremental Program Obfuscation
Advances in Cryptology – CRYPTO 2017 - Lecture Notes in Computer Science
◽
10.1007/978-3-319-63715-0_7
◽
2017
◽
pp. 193-223
◽
Cited By ~ 5
Author(s):
Sanjam Garg
◽
Omkant Pandey
Keyword(s):
Program Obfuscation
Download Full-text
Limits on Low-Degree Pseudorandom Generators (Or: Sum-of-Squares Meets Program Obfuscation)
Advances in Cryptology – EUROCRYPT 2018 - Lecture Notes in Computer Science
◽
10.1007/978-3-319-78375-8_21
◽
2018
◽
pp. 649-679
◽
Cited By ~ 6
Author(s):
Boaz Barak
◽
Zvika Brakerski
◽
Ilan Komargodski
◽
Pravesh K. Kothari
Keyword(s):
Sum Of Squares
◽
Pseudorandom Generators
◽
Low Degree
◽
Program Obfuscation
Download Full-text
Program Obfuscation Scheme Using Random Numbers to Complicate Control Flow
Embedded and Ubiquitous Computing – EUC 2005 Workshops - Lecture Notes in Computer Science
◽
10.1007/11596042_94
◽
2005
◽
pp. 916-925
◽
Cited By ~ 3
Author(s):
Tatsuya Toyofuku
◽
Toshihiro Tabata
◽
Kouichi Sakurai
Keyword(s):
Control Flow
◽
Random Numbers
◽
Program Obfuscation
Download Full-text
Analysis of Program Obfuscation Schemes with Variable Encoding Technique
IEICE Transactions on Fundamentals of Electronics Communications and Computer Sciences
◽
10.1093/ietfec/e91-a.1.316
◽
2008
◽
Vol E91-A
(1)
◽
pp. 316-329
◽
Cited By ~ 6
Author(s):
K. FUKUSHIMA
◽
S. KIYOMOTO
◽
T. TANAKA
◽
K. SAKURAI
Keyword(s):
Program Obfuscation
Download Full-text
Program Obfuscation and One-Time Programs
Topics in Cryptology – CT-RSA 2008 - Lecture Notes in Computer Science
◽
10.1007/978-3-540-79263-5_21
◽
2008
◽
pp. 333-334
◽
Cited By ~ 1
Author(s):
Shafi Goldwasser
Keyword(s):
Program Obfuscation
Download Full-text
Cryptographic Program Obfuscation: Practical Solutions and Application-Driven Models
Versatile Cybersecurity - Advances in Information Security
◽
10.1007/978-3-319-97643-3_5
◽
2018
◽
pp. 141-167
Author(s):
Giovanni Di Crescenzo
Keyword(s):
Program Obfuscation
Download Full-text
Formal verification of a program obfuscation based on mixed Boolean-arithmetic expressions
Proceedings of the 8th ACM SIGPLAN International Conference on Certified Programs and Proofs - CPP 2019
◽
10.1145/3293880.3294103
◽
2019
◽
Cited By ~ 1
Author(s):
Sandrine Blazy
◽
Rémi Hutin
Keyword(s):
Formal Verification
◽
Program Obfuscation
◽
Arithmetic Expressions
Download Full-text
Stochastic Optimization of Program Obfuscation
2017 IEEE/ACM 39th International Conference on Software Engineering (ICSE)
◽
10.1109/icse.2017.28
◽
2017
◽
Cited By ~ 9
Author(s):
Han Liu
◽
Chengnian Sun
◽
Zhendong Su
◽
Yu Jiang
◽
Ming Gu
◽
...
Keyword(s):
Stochastic Optimization
◽
Program Obfuscation
Download Full-text
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close