WEKO3
アイテム
An Obfuscation Scheme Using Affine Transformation and Its Implementation
https://ipsj.ixsq.nii.ac.jp/records/67747
https://ipsj.ixsq.nii.ac.jp/records/6774701836fd0-944b-42c3-a5f2-69342bd17b24
名前 / ファイル | ライセンス | アクション |
---|---|---|
![]() |
Copyright (c) 2009 by the Information Processing Society of Japan
|
|
オープンアクセス |
Item type | Journal(1) | |||||||
---|---|---|---|---|---|---|---|---|
公開日 | 2006-08-15 | |||||||
タイトル | ||||||||
タイトル | An Obfuscation Scheme Using Affine Transformation and Its Implementation | |||||||
タイトル | ||||||||
言語 | en | |||||||
タイトル | An Obfuscation Scheme Using Affine Transformation and Its Implementation | |||||||
言語 | ||||||||
言語 | eng | |||||||
キーワード | ||||||||
主題Scheme | Other | |||||||
主題 | 特集:ユビキタス社会を支えるコンピュータセキュリティ技術 | |||||||
資源タイプ | ||||||||
資源タイプ識別子 | http://purl.org/coar/resource_type/c_6501 | |||||||
資源タイプ | journal article | |||||||
著者所属 | ||||||||
KDDI R&D Laboratories Inc. | ||||||||
著者所属 | ||||||||
KDDI R&D Laboratories Inc. | ||||||||
著者所属 | ||||||||
KDDI R&D Laboratories Inc. | ||||||||
著者所属(英) | ||||||||
en | ||||||||
KDDI R&D Laboratories Inc. | ||||||||
著者所属(英) | ||||||||
en | ||||||||
KDDI R&D Laboratories Inc. | ||||||||
著者所属(英) | ||||||||
en | ||||||||
KDDI R&D Laboratories Inc. | ||||||||
著者名 |
Kazuhide, Fukushima
× Kazuhide, Fukushima
|
|||||||
著者名(英) |
Kazuhide, Fukushima
× Kazuhide, Fukushima
|
|||||||
論文抄録 | ||||||||
内容記述タイプ | Other | |||||||
内容記述 | Program analysis techniques have improved steadily over the past several decades, and these techniques have made algorithms and secret data contained in programs susceptible to discovery. Obfuscation is a technique to protect against this threat. Obfuscation schemes that encode variables have the potential to hide both algorithms and secret data. We define five types of attack―data-dependency attacks, dynamic attacks, instruction-guessing attacks, numerical attacks, and brute force attacks―that can be launched against existing obfuscation schemes. We then propose an obfuscation scheme which encodes variables in a code using an affine transformation. Our scheme is more secure than that of Sato, et al. because it can protect against dependency attacks, instruction-guessing attacks, and numerical attacks. We describe the implementation of our scheme as an obfuscation tool for C/C++ code. | |||||||
論文抄録(英) | ||||||||
内容記述タイプ | Other | |||||||
内容記述 | Program analysis techniques have improved steadily over the past several decades, and these techniques have made algorithms and secret data contained in programs susceptible to discovery. Obfuscation is a technique to protect against this threat. Obfuscation schemes that encode variables have the potential to hide both algorithms and secret data. We define five types of attack―data-dependency attacks, dynamic attacks, instruction-guessing attacks, numerical attacks, and brute force attacks―that can be launched against existing obfuscation schemes. We then propose an obfuscation scheme which encodes variables in a code using an affine transformation. Our scheme is more secure than that of Sato, et al. because it can protect against dependency attacks, instruction-guessing attacks, and numerical attacks. We describe the implementation of our scheme as an obfuscation tool for C/C++ code. | |||||||
書誌レコードID | ||||||||
収録物識別子タイプ | NCID | |||||||
収録物識別子 | AN00116647 | |||||||
書誌情報 |
情報処理学会論文誌 巻 47, 号 8, p. 2556-2570, 発行日 2006-08-15 |
|||||||
ISSN | ||||||||
収録物識別子タイプ | ISSN | |||||||
収録物識別子 | 1882-7764 |