Previous |  Up |  Next

Article

Title: C source code obfuscator (English)
Author: Ďurfina, Lukáš
Author: Kolář, Dušan
Language: English
Journal: Kybernetika
ISSN: 0023-5954
Volume: 48
Issue: 3
Year: 2012
Pages: 494-501
Summary lang: English
.
Category: math
.
Summary: Obfuscation is a process that changes the code, but without any change to semantics. This process can be done on two levels. On the binary code level, where the instructions or control flow are modified, or on the source code level, where we can change only a structure of code to make it harder to read or we can make adjustments to reduce chance of successful reverse engineering. (English)
Keyword: obfuscation
Keyword: source code
Keyword: malware
MSC: 68N15
.
Date available: 2012-08-31T15:57:42Z
Last updated: 2013-09-24
Stable URL: http://hdl.handle.net/10338.dmlcz/142951
.
Reference: [1] Free Software Foundation, Inc.: Volatiles – Using the GNU Compiler Collection.2010, http://gcc.gnu.org/onlinedocs/gcc/Volatiles.html.
Reference: [2] Harbour, N.: Advanced Software Armoring and Polymorphic Kung-Fu.DEFCON 16, 2008.
Reference: [3] Intel: Intel Architecture Software Developer's Manual Volume 2: Instruction Set Reference.1999, http://download.intel.com/design/intarch/manuals/24319101.pdf.
Reference: [4] Karnik, A., Goswami, S., Guha, R.: Detecting Obfuscated Viruses Using Cosine Similarity Analysis.Modelling Simulation, 2007.
Reference: [5] Low, D.: Protecting Java code via code obfuscation.In: Crossroads – Special Issue on Robotics, 1998.
Reference: [6] Microsoft: MSDN Library.http://msdn.microsoft.com/en-us/library/ms123401.aspx.
Reference: [7] Moser, A., Kruegel, Ch., Kirda, E.: Limits of static analysis for malware detection.In: Computer Security Applications Conference, 2007.
Reference: [8] Savarese, Ch., Hart, B.: The Caesar Cipher.1999, http://www.cs.trincoll.edu/ crypto/historical/caesar.html.
.

Files

Files Size Format View
Kybernetika_48-2012-3_10.pdf 247.0Kb application/pdf View/Open
Back to standard record
Partner of
EuDML logo