{"title":"Aspects of Intermediate Level Obfuscation","authors":"Dmitriy Dunaev, L. Lengyel","doi":"10.1109/ECBS-EERC.2013.25","DOIUrl":null,"url":null,"abstract":"The aim of obfuscation in general is to prevent malicious users from disclosing properties of the original source program. This goal can be achieved by an intermediate level obfuscation that deals with a target platform independent intermediate code. In this paper, we discuss general approaches to an intermediate level obfuscation algorithm, pointing out problems and proposing solutions. The paper discusses such aspects of intermediate level obfuscation as input data analysis, mixing of contexts, external function calls, etc. The focus is set on working out an optimization resistant intermediate level obfuscation algorithm that can reliably protect routines from unauthorized analysis and modification.","PeriodicalId":314029,"journal":{"name":"2013 3rd Eastern European Regional Conference on the Engineering of Computer Based Systems","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2013-08-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2013 3rd Eastern European Regional Conference on the Engineering of Computer Based Systems","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ECBS-EERC.2013.25","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 4
Abstract
The aim of obfuscation in general is to prevent malicious users from disclosing properties of the original source program. This goal can be achieved by an intermediate level obfuscation that deals with a target platform independent intermediate code. In this paper, we discuss general approaches to an intermediate level obfuscation algorithm, pointing out problems and proposing solutions. The paper discusses such aspects of intermediate level obfuscation as input data analysis, mixing of contexts, external function calls, etc. The focus is set on working out an optimization resistant intermediate level obfuscation algorithm that can reliably protect routines from unauthorized analysis and modification.