Related articles |
---|
invitation to discussion: code and protocol obfuscation techniques isiisorisiaint@gmail.com (Gyll .) (2013-08-01) |
RE: invitation to discussion: code and protocol obfuscation techniques costello@mitre.org (Costello, Roger L.) (2013-08-03) |
From: | "Costello, Roger L." <costello@mitre.org> |
Newsgroups: | comp.compilers |
Date: | Sat, 3 Aug 2013 20:58:09 +0000 |
Organization: | Compilers Central |
References: | 13-08-002 |
Keywords: | code, bibliography |
Posted-Date: | 03 Aug 2013 17:17:01 EDT |
Thread-Topic: | [Compilers] invitation to discussion: code and protocol obfuscation techniques |
Thread-Index: | AQHOkIqYx9sKhS2o+kKrqJyg2wYPlJmD9sIw |
x-originating-ip: | [129.83.31.53] |
UCLA computer science professor Amit Sahai and a team of researchers have
designed a system to encrypt software so that it only allows someone to use a
program as intended while preventing any deciphering of the code behind it.
This is known in computer science as "software obfuscation," and it is the
first time it has been accomplished.
http://newsroom.ucla.edu/portal/ucla/ucla-computer-scientists-develop-247527.aspx
[I looked at the paper, but it's not obvious to what extent they've actually
made it work on real code. -John]
-----Original Message-----
From: compilers-owner@lists.iecc.com [mailto:compilers-owner@lists.iecc.com]
On Behalf Of Gyll .
Sent: Thursday, August 01, 2013 7:49 AM
Subject: invitation to discussion: code and protocol obfuscation
techniques
I'd like to get some info on the subject of code obfuscation,
particularly source code-level obfuscation methods that will not get
rendered [totally] useless by code optimizers, program flow graph
extractors, and other program analysis tools. ...
Return to the
comp.compilers page.
Search the
comp.compilers archives again.