TY - GEN
T1 - Program obfuscation scheme using random numbers to complicate control flow
AU - Toyofuku, Tatsuya
AU - Tabata, Toshihiro
AU - Sakurai, Kouichi
PY - 2005/12/1
Y1 - 2005/12/1
N2 - For the security technology that has been achieved with software in the computer system and the protection of the intellectual property right of software, software protection technology is necessary. One of those techniques is called obfuscation, which converts program to make analysis difficult while preserving its function. In this paper, we examine the applicability of our program obfuscation scheme to complicate control flow and study the tolerance against program analysis.
AB - For the security technology that has been achieved with software in the computer system and the protection of the intellectual property right of software, software protection technology is necessary. One of those techniques is called obfuscation, which converts program to make analysis difficult while preserving its function. In this paper, we examine the applicability of our program obfuscation scheme to complicate control flow and study the tolerance against program analysis.
UR - http://www.scopus.com/inward/record.url?scp=33744906538&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=33744906538&partnerID=8YFLogxK
U2 - 10.1007/11596042_94
DO - 10.1007/11596042_94
M3 - Conference contribution
AN - SCOPUS:33744906538
SN - 3540308032
SN - 9783540308034
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 916
EP - 925
BT - Embedded and Ubiquitous Computing - EUC 2005 Workshops
T2 - EUC 2005 Workshops: UISW, NCUS, SecUbiq, USN, and TAUES
Y2 - 6 December 2005 through 9 December 2005
ER -