A survey of control-flow obfuscations

22Citations
Citations of this article
24Readers
Mendeley users who have this article in their library.
Get full text

Abstract

In this short survey, we provide an overview of obfuscation and then shift our focus to outlining various non-trivial control-flow obfuscation techniques. Along the way, we highlight two transforms having provable security properties: the dispatcher model and opaque predicates. We comment on the strength and weaknesses of these transforms and outline difficulties associated in generating generalised classes of these.

Cite

CITATION STYLE

APA

Majumdar, A., Thomborson, C., & Drape, S. (2006). A survey of control-flow obfuscations. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 4332 LNCS, pp. 353–356). Springer Verlag. https://doi.org/10.1007/11961635_26

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free