Intellectual Property Protection using Obfuscation

1 Definitions of Code Obfuscation 3 1.1 Collberg et al . . . . . . . . . . . . . . . . . . . . . . . . . . 4 1.2 Barak et al . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6 1.3 Assertion Obfuscations . . . . . . . . . . . . . . . . . . . . . . 7 1.4 Slicing Obfuscations . . . . . . . . . . . . . . . . . . . . . . . 7 1.5 Using Metrics . . . . . . . . . . . . . . . . . . . . . . . . . . . 8

[1]  Anas N. Al-Rabadi,et al.  A comparison of modified reconstructability analysis and Ashenhurst‐Curtis decomposition of Boolean functions , 2004 .

[2]  David W. Binkley,et al.  Slice-based cohesion metrics and software intervention , 2004, 11th Working Conference on Reverse Engineering.

[3]  Yuan Xiang Gu,et al.  An Approach to the Obfuscation of Control-Flow of Sequential Computer Programs , 2001, ISC.

[4]  Taghi M. Khoshgoftaar,et al.  Measurement of data structure complexity , 1993, J. Syst. Softw..

[5]  Yuichiro Kanzaki,et al.  Queue-based cost evaluation of mental simulation process in program comprehension , 2003, Proceedings. 5th International Workshop on Enterprise Networking and Computing in Healthcare Industry (IEEE Cat. No.03EX717).

[6]  Stephen Drape,et al.  A Survey of Control-Flow Obfuscations , 2006, ICISS.

[7]  Christian S. Collberg,et al.  Watermarking, Tamper-Proofing, and Obfuscation-Tools for Software Protection , 2002, IEEE Trans. Software Eng..

[8]  Jack W. Davidson,et al.  Protection of software-based survivability mechanisms , 2001, 2001 International Conference on Dependable Systems and Networks.

[9]  Clark D. Thomborson,et al.  Manufacturing opaque predicates in distributed systems for code obfuscation , 2006, ACSC.

[10]  Linda M. Ott,et al.  Slice based metrics for estimating cohesion , 1993, [1993] Proceedings First International Software Metrics Symposium.

[11]  Christian S. Collberg,et al.  A Taxonomy of Obfuscating Transformations , 1997 .

[12]  Fred M. Gerguras Intellectual property protection in the USA , 1987 .

[13]  Mark Weiser,et al.  Program Slicing , 1981, IEEE Transactions on Software Engineering.

[14]  Stephen Drape,et al.  Obfuscation of abstract data-types , 2004 .

[15]  A. Majumdar,et al.  Series Design and Evaluation of Slicing Obfuscations , 2007 .

[16]  Clark Thomborson,et al.  Manufacturing cheap, resilient, and stealthy opaque constructs , 1998, POPL '98.

[17]  Warren A. Harrison,et al.  A complexity measure based on nesting level , 1981, SIGP.

[18]  Stephen Drape,et al.  Specifying Imperative Data Obfuscations , 2007, ISC.

[19]  Alfred V. Aho,et al.  Compilers: Principles, Techniques, and Tools , 1986, Addison-Wesley series in computer science / World student series edition.

[20]  Oege de Moor,et al.  Transforming the .NET intermediate language using path logic programming , 2002, PPDP '02.

[21]  Clark Thomborson,et al.  Metrics-based Evaluation of Slicing Obfuscations , 2007 .

[22]  Koen De Bosschere,et al.  Understanding Obfuscated Code , 2006, 14th IEEE International Conference on Program Comprehension (ICPC'06).

[23]  Jens Palsberg,et al.  Experience with software watermarking , 2000, Proceedings 16th Annual Computer Security Applications Conference (ACSAC'00).

[24]  P. Biondi,et al.  Silver Needle in the Skype , 2006 .

[25]  Frank Tip,et al.  A survey of program slicing techniques , 1994, J. Program. Lang..

[26]  Amit Sahai,et al.  On the (im)possibility of obfuscating programs , 2001, JACM.

[27]  Kai Engelhardt,et al.  Data Refinement: Model-Oriented Proof Methods and their Comparison , 1998 .

[28]  Stephen Drape,et al.  Metrics-based Evaluation of Slicing Obfuscations , 2007, Third International Symposium on Information Assurance and Security.

[29]  Nuno Santos,et al.  A Generic DRM Framework for J 2 ME Applications , 2003 .

[30]  Stephen Drape,et al.  Slicing obfuscations: design, correctness, and evaluation , 2007, DRM '07.

[31]  Stephen Drape,et al.  Slicing Aided Design of Obfuscating Transforms , 2007, 6th IEEE/ACIS International Conference on Computer and Information Science (ICIS 2007).

[32]  Stephen Drape Generalising the array split obfuscation , 2007, Inf. Sci..