menu
{ "item_title" : "Algorithms for White-Box Obfuscation Using Randomized Subcircuit Selection and Replacement", "item_author" : [" Kenneth E. Norman "], "item_description" : "Software protection remains an active research area with the goal of preventing adversarial software exploitation such as reverse engineering, tampering, and piracy. Heuristic obfuscation techniques lack strong theoretical underpinnings while current theoretical research highlights the impossibility of creating general, e cient, and information theoretically secure obfuscators. In this research, we consider a bridge between these two worlds by examining obfuscators based on the Random Program Model (RPM). Such a model envisions the use of program encryption techniques which change the black-box (semantic) and white-box (structural) representations of underlying programs. In this thesis we explore the possibilities for white-box transformation. Under an RPM formulation, if an adversary cannot distinguish an original program from either its obfuscated version (whose black-box behavior has been strategically altered) or a randomly generated program of comparable size, then the white-box intent of the original program has been su ciently protected.", "item_img_path" : "https://covers2.booksamillion.com/covers/bam/1/28/839/572/1288395728_b.jpg", "price_data" : { "retail_price" : "15.95", "online_price" : "15.95", "our_price" : "15.95", "club_price" : "15.95", "savings_pct" : "0", "savings_amt" : "0.00", "club_savings_pct" : "0", "club_savings_amt" : "0.00", "discount_pct" : "10", "store_price" : "" } }
Algorithms for White-Box Obfuscation Using Randomized Subcircuit Selection and Replacement|Kenneth E. Norman

Algorithms for White-Box Obfuscation Using Randomized Subcircuit Selection and Replacement

local_shippingShip to Me
In Stock.
FREE Shipping for Club Members help

Overview

Software protection remains an active research area with the goal of preventing adversarial software exploitation such as reverse engineering, tampering, and piracy. Heuristic obfuscation techniques lack strong theoretical underpinnings while current theoretical research highlights the impossibility of creating general, e cient, and information theoretically secure obfuscators. In this research, we consider a bridge between these two worlds by examining obfuscators based on the Random Program Model (RPM). Such a model envisions the use of program encryption techniques which change the black-box (semantic) and white-box (structural) representations of underlying programs. In this thesis we explore the possibilities for white-box transformation. Under an RPM formulation, if an adversary cannot distinguish an original program from either its obfuscated version (whose black-box behavior has been strategically altered) or a randomly generated program of comparable size, then the white-box intent of the original program has been su ciently protected.

This item is Non-Returnable

Details

  • ISBN-13: 9781288395729
  • ISBN-10: 1288395728
  • Publisher: Biblioscholar
  • Publish Date: December 2012
  • Dimensions: 9.21 x 6.14 x 0.21 inches
  • Shipping Weight: 0.33 pounds
  • Page Count: 100

Related Categories

You May Also Like...

    1

BAM Customer Reviews