In this short survey, we provide an overview of obfuscation and then shift our focus to outlining various non-trivial control-flow obfuscation techniques. Along the way, we highlight two transforms having provable security properties: the dispatcher model and opaque predicates. We comment on the strength and weaknesses of these transforms and outline difficulties associated in generating generalised classes of these.
CITATION STYLE
Majumdar, A., Thomborson, C., & Drape, S. (2006). A survey of control-flow obfuscations. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 4332 LNCS, pp. 353–356). Springer Verlag. https://doi.org/10.1007/11961635_26
Mendeley helps you to discover research relevant for your work.