Software obfuscation from crackers' viewpoint

Hiroki Yamauchi, Yuichiro Kanzaki, Akito Monden, Masahide Nakamura, Ken Ichi Matsumoto

Research output: Chapter in Book/Report/Conference proceedingConference contribution

9 Citations (Scopus)

Abstract

Various kinds of software obfuscation methods have been proposed to protect security-sensitive information involved in software implementations. This paper proposes a cracker-centric approach to give a guideline for employing existing obfuscation methods to disrupt crackers' actions.

Original languageEnglish
Title of host publicationProceedings of the Seventh IASTED International Conference on Advances in Computer Science and Technology
Pages286-291
Number of pages6
Publication statusPublished - 2006
Externally publishedYes
Event7th IASTED International Conference on Advances in Computer Science and Technology - Puerto Vallarta, Mexico
Duration: Jan 23 2006Jan 25 2006

Other

Other7th IASTED International Conference on Advances in Computer Science and Technology
CountryMexico
CityPuerto Vallarta
Period1/23/061/25/06

Keywords

  • Attacks
  • Information leakage
  • Software protection
  • Symmetric-key cryptography
  • Tamper-resistance

ASJC Scopus subject areas

  • Engineering(all)

Cite this

Yamauchi, H., Kanzaki, Y., Monden, A., Nakamura, M., & Matsumoto, K. I. (2006). Software obfuscation from crackers' viewpoint. In Proceedings of the Seventh IASTED International Conference on Advances in Computer Science and Technology (pp. 286-291)

Software obfuscation from crackers' viewpoint. / Yamauchi, Hiroki; Kanzaki, Yuichiro; Monden, Akito; Nakamura, Masahide; Matsumoto, Ken Ichi.

Proceedings of the Seventh IASTED International Conference on Advances in Computer Science and Technology. 2006. p. 286-291.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Yamauchi, H, Kanzaki, Y, Monden, A, Nakamura, M & Matsumoto, KI 2006, Software obfuscation from crackers' viewpoint. in Proceedings of the Seventh IASTED International Conference on Advances in Computer Science and Technology. pp. 286-291, 7th IASTED International Conference on Advances in Computer Science and Technology, Puerto Vallarta, Mexico, 1/23/06.
Yamauchi H, Kanzaki Y, Monden A, Nakamura M, Matsumoto KI. Software obfuscation from crackers' viewpoint. In Proceedings of the Seventh IASTED International Conference on Advances in Computer Science and Technology. 2006. p. 286-291
Yamauchi, Hiroki ; Kanzaki, Yuichiro ; Monden, Akito ; Nakamura, Masahide ; Matsumoto, Ken Ichi. / Software obfuscation from crackers' viewpoint. Proceedings of the Seventh IASTED International Conference on Advances in Computer Science and Technology. 2006. pp. 286-291
@inproceedings{44dbcebb1b844cd0ae810efc63f7eb39,
title = "Software obfuscation from crackers' viewpoint",
abstract = "Various kinds of software obfuscation methods have been proposed to protect security-sensitive information involved in software implementations. This paper proposes a cracker-centric approach to give a guideline for employing existing obfuscation methods to disrupt crackers' actions.",
keywords = "Attacks, Information leakage, Software protection, Symmetric-key cryptography, Tamper-resistance",
author = "Hiroki Yamauchi and Yuichiro Kanzaki and Akito Monden and Masahide Nakamura and Matsumoto, {Ken Ichi}",
year = "2006",
language = "English",
isbn = "0889865477",
pages = "286--291",
booktitle = "Proceedings of the Seventh IASTED International Conference on Advances in Computer Science and Technology",

}

TY - GEN

T1 - Software obfuscation from crackers' viewpoint

AU - Yamauchi, Hiroki

AU - Kanzaki, Yuichiro

AU - Monden, Akito

AU - Nakamura, Masahide

AU - Matsumoto, Ken Ichi

PY - 2006

Y1 - 2006

N2 - Various kinds of software obfuscation methods have been proposed to protect security-sensitive information involved in software implementations. This paper proposes a cracker-centric approach to give a guideline for employing existing obfuscation methods to disrupt crackers' actions.

AB - Various kinds of software obfuscation methods have been proposed to protect security-sensitive information involved in software implementations. This paper proposes a cracker-centric approach to give a guideline for employing existing obfuscation methods to disrupt crackers' actions.

KW - Attacks

KW - Information leakage

KW - Software protection

KW - Symmetric-key cryptography

KW - Tamper-resistance

UR - http://www.scopus.com/inward/record.url?scp=33847210738&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=33847210738&partnerID=8YFLogxK

M3 - Conference contribution

AN - SCOPUS:33847210738

SN - 0889865477

SN - 9780889865471

SP - 286

EP - 291

BT - Proceedings of the Seventh IASTED International Conference on Advances in Computer Science and Technology

ER -