|invitation to discussion: code and protocol obfuscation techniques firstname.lastname@example.org (Gyll .) (2013-08-01)|
|RE: invitation to discussion: code and protocol obfuscation techniques email@example.com (Costello, Roger L.) (2013-08-03)|
|From:||"Costello, Roger L." <firstname.lastname@example.org>|
|Date:||Sat, 3 Aug 2013 20:58:09 +0000|
|Posted-Date:||03 Aug 2013 17:17:01 EDT|
|Thread-Topic:||[Compilers] invitation to discussion: code and protocol obfuscation techniques|
UCLA computer science professor Amit Sahai and a team of researchers have
designed a system to encrypt software so that it only allows someone to use a
program as intended while preventing any deciphering of the code behind it.
This is known in computer science as "software obfuscation," and it is the
first time it has been accomplished.
[I looked at the paper, but it's not obvious to what extent they've actually
made it work on real code. -John]
From: email@example.com [mailto:firstname.lastname@example.org]
On Behalf Of Gyll .
Sent: Thursday, August 01, 2013 7:49 AM
Subject: invitation to discussion: code and protocol obfuscation
I'd like to get some info on the subject of code obfuscation,
particularly source code-level obfuscation methods that will not get
rendered [totally] useless by code optimizers, program flow graph
extractors, and other program analysis tools. ...
Return to the
Search the comp.compilers archives again.