RE: invitation to discussion: code and protocol obfuscation techniques

"Costello, Roger L." <costello@mitre.org>
Sat, 3 Aug 2013 20:58:09 +0000

          From comp.compilers

Related articles
invitation to discussion: code and protocol obfuscation techniques isiisorisiaint@gmail.com (Gyll .) (2013-08-01)
RE: invitation to discussion: code and protocol obfuscation techniques costello@mitre.org (Costello, Roger L.) (2013-08-03)
| List of all articles for this month |
From: "Costello, Roger L." <costello@mitre.org>
Newsgroups: comp.compilers
Date: Sat, 3 Aug 2013 20:58:09 +0000
Organization: Compilers Central
References: 13-08-002
Keywords: code, bibliography
Posted-Date: 03 Aug 2013 17:17:01 EDT
Thread-Topic: [Compilers] invitation to discussion: code and protocol obfuscation techniques
Thread-Index: AQHOkIqYx9sKhS2o+kKrqJyg2wYPlJmD9sIw
x-originating-ip: [129.83.31.53]

UCLA computer science professor Amit Sahai and a team of researchers have
designed a system to encrypt software so that it only allows someone to use a
program as intended while preventing any deciphering of the code behind it.
This is known in computer science as "software obfuscation," and it is the
first time it has been accomplished.


http://newsroom.ucla.edu/portal/ucla/ucla-computer-scientists-develop-247527.aspx


[I looked at the paper, but it's not obvious to what extent they've actually
made it work on real code. -John]


-----Original Message-----
From: compilers-owner@lists.iecc.com [mailto:compilers-owner@lists.iecc.com]
On Behalf Of Gyll .
Sent: Thursday, August 01, 2013 7:49 AM
Subject: invitation to discussion: code and protocol obfuscation
techniques


I'd like to get some info on the subject of code obfuscation,
particularly source code-level obfuscation methods that will not get
rendered [totally] useless by code optimizers, program flow graph
extractors, and other program analysis tools. ...



Post a followup to this message

Return to the comp.compilers page.
Search the comp.compilers archives again.