The current state of art in program obfuscations:definitions of obfuscation security
Program obfuscation is a semantic-preserving transformation aimed at bringing a program into such a form, which impedes the understanding of its algorithm and data structures or prevents extracting of some valuable information from the text of a program. Since obfuscation could find wide use in comp...
Uloženo v:
| Vydáno v: | Trudy Instituta sistemnogo programmirovaniâ Ročník 26; číslo 3; s. 167 - 198 |
|---|---|
| Hlavní autoři: | , , , |
| Médium: | Journal Article |
| Jazyk: | angličtina |
| Vydáno: |
Russian Academy of Sciences, Ivannikov Institute for System Programming
01.10.2018
|
| Témata: | |
| ISSN: | 2079-8156, 2220-6426 |
| On-line přístup: | Získat plný text |
| Tagy: |
Přidat tag
Žádné tagy, Buďte první, kdo vytvoří štítek k tomuto záznamu!
|
| Abstract | Program obfuscation is a semantic-preserving transformation aimed at bringing a program into such a form, which impedes the understanding of its algorithm and data structures or prevents extracting of some valuable information from the text of a program. Since obfuscation could find wide use in computer security, information hiding and cryptography, security requirements to program obfuscators became a major focus of interests for pioneers of theory of software obfuscation. In this paper we give a survey of various definitions of obfuscation security and main results that establish possibility or impossibility of secure program obfuscation under certain cryptographic assumptions. We begin with a short retrospective survey on the origin and development of program obfuscation concept in software engineering and mathematical cryptography. In the introduction we also point out on the main difficulties in the development of practical and secure obfuscation techniques. In the next section we discuss the main line of research in the application of program obfuscation to the solution of various problems in system programming and software security. Finally, in section 3 we present and discuss a compendium of formal definitions of the program obfuscation concept developed so far in mathematical cryptography - black-box obfuscation, gray-box obfuscation, the best possible obfuscation, obfuscation with auxiliary inputs, etc.. We also make a comparative analysis of these definitions and present the main results on the (im)possibility of secure program obfuscation w.r.t. every such definition. |
|---|---|
| AbstractList | Program obfuscation is a semantic-preserving transformation aimed at bringing a program into such a form, which impedes the understanding of its algorithm and data structures or prevents extracting of some valuable information from the text of a program. Since obfuscation could find wide use in computer security, information hiding and cryptography, security requirements to program obfuscators became a major focus of interests for pioneers of theory of software obfuscation. In this paper we give a survey of various definitions of obfuscation security and main results that establish possibility or impossibility of secure program obfuscation under certain cryptographic assumptions. We begin with a short retrospective survey on the origin and development of program obfuscation concept in software engineering and mathematical cryptography. In the introduction we also point out on the main difficulties in the development of practical and secure obfuscation techniques. In the next section we discuss the main line of research in the application of program obfuscation to the solution of various problems in system programming and software security. Finally, in section 3 we present and discuss a compendium of formal definitions of the program obfuscation concept developed so far in mathematical cryptography - black-box obfuscation, gray-box obfuscation, the best possible obfuscation, obfuscation with auxiliary inputs, etc.. We also make a comparative analysis of these definitions and present the main results on the (im)possibility of secure program obfuscation w.r.t. every such definition. |
| Author | Shokurov, V.A. Zakharov, V.A. Kuzurin, N.N. Varnovsky, N.P. |
| Author_xml | – sequence: 1 givenname: N.P. surname: Varnovsky fullname: Varnovsky, N.P. – sequence: 2 givenname: V.A. surname: Zakharov fullname: Zakharov, V.A. – sequence: 3 givenname: N.N. surname: Kuzurin fullname: Kuzurin, N.N. – sequence: 4 givenname: V.A. surname: Shokurov fullname: Shokurov, V.A. |
| BookMark | eNpNkE1PAjEQhhuDiYj8Aw896qHa7916I8QPEhKN4Lnp9gNLYEva5cC_dwFjPM2bmcmTmecaDNrUegBuCX4gQhD-OFt8fE4WiGLCEZV37B6pCzCklGIkOZWDPuNKoZoIeQXGpawxxlTgimEyBMvlt4d2n7NvO1g603mYAjS5g7GFu5xW2WxhasK-WNPF1JYn50Ns4ykfV__NYPE9KXaHG3AZzKb48W8dga-X5-X0Dc3fX2fTyRzZ_haFuBBVEzhuqLSGqjqIxnBpFObWEo454d5LKwQNoSGKqsYZJ70UshHUVNyzEZiduS6Ztd7luDX5oJOJ-tRIeaX7T6LdeG0dcwIzWtXBcU9ULZmqiTPeesNCsD2Ln1k2p1KyD388gvVJtD6L1kfRmkrNtFbsBzGQdRM |
| ContentType | Journal Article |
| DBID | AAYXX CITATION DOA |
| DOI | 10.15514/ISPRAS-2014-26(3)-9 |
| DatabaseName | CrossRef DOAJ Directory of Open Access Journals |
| DatabaseTitle | CrossRef |
| DatabaseTitleList | |
| Database_xml | – sequence: 1 dbid: DOA name: DOAJ Directory of Open Access Journals url: https://www.doaj.org/ sourceTypes: Open Website |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Computer Science |
| EISSN | 2220-6426 |
| EndPage | 198 |
| ExternalDocumentID | oai_doaj_org_article_cd3d503278fd4e19863981daecea3ffc 10_15514_ISPRAS_2014_26_3__9 |
| GroupedDBID | 642 AAYXX ALMA_UNASSIGNED_HOLDINGS CITATION GROUPED_DOAJ OK1 |
| ID | FETCH-LOGICAL-c1569-4557bf40b26ca298f5ba46a904cc140414ee6c552ffb1929bdad6e656b52a74e3 |
| IEDL.DBID | DOA |
| ISSN | 2079-8156 |
| IngestDate | Mon Nov 03 22:02:05 EST 2025 Sat Nov 29 05:34:00 EST 2025 |
| IsDoiOpenAccess | true |
| IsOpenAccess | true |
| IsPeerReviewed | true |
| IsScholarly | true |
| Issue | 3 |
| Language | English |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-c1569-4557bf40b26ca298f5ba46a904cc140414ee6c552ffb1929bdad6e656b52a74e3 |
| OpenAccessLink | https://doaj.org/article/cd3d503278fd4e19863981daecea3ffc |
| PageCount | 32 |
| ParticipantIDs | doaj_primary_oai_doaj_org_article_cd3d503278fd4e19863981daecea3ffc crossref_primary_10_15514_ISPRAS_2014_26_3__9 |
| PublicationCentury | 2000 |
| PublicationDate | 2018-10-01 |
| PublicationDateYYYYMMDD | 2018-10-01 |
| PublicationDate_xml | – month: 10 year: 2018 text: 2018-10-01 day: 01 |
| PublicationDecade | 2010 |
| PublicationTitle | Trudy Instituta sistemnogo programmirovaniâ |
| PublicationYear | 2018 |
| Publisher | Russian Academy of Sciences, Ivannikov Institute for System Programming |
| Publisher_xml | – name: Russian Academy of Sciences, Ivannikov Institute for System Programming |
| SSID | ssj0002507301 |
| Score | 2.041307 |
| Snippet | Program obfuscation is a semantic-preserving transformation aimed at bringing a program into such a form, which impedes the understanding of its algorithm and... |
| SourceID | doaj crossref |
| SourceType | Open Website Index Database |
| StartPage | 167 |
| SubjectTerms | машина тьюринга модель черного ящика обфускация программа сложность стойкость обфускации |
| Title | The current state of art in program obfuscations:definitions of obfuscation security |
| URI | https://doaj.org/article/cd3d503278fd4e19863981daecea3ffc |
| Volume | 26 |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVAON databaseName: DOAJ Directory of Open Access Journals customDbUrl: eissn: 2220-6426 dateEnd: 20201231 omitProxy: false ssIdentifier: ssj0002507301 issn: 2079-8156 databaseCode: DOA dateStart: 20100101 isFulltext: true titleUrlDefault: https://www.doaj.org/ providerName: Directory of Open Access Journals |
| link | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV07T8MwELZQxcDCG1Fe8sAAg9U0fsVsBVGBhKqKFqmb5afUJUV98Ps5JykKEwtLhtiKnO8cf3fR3XcI3TLhHBCJI4zHCBfPiWLUkyIAXxsrubVVofCbHI2K2UyNW62-Uk5YLQ9cA9dznnqe0VwW0bMAITJQKvhYJrhgaIwunb6ZVK1gKp3BQOxp66bOcjBIkiRKUzeXPITe62T8PpjADukzkos7ek_UL15qyfdXPDM8RPuNg4gH9cKO0E4oj9HBtvkCbr7FEzQFA2NXqyvhqiwILyKG98HzEjdZV3hh42bV_JR78CHOyzpDK01tjeFV08XuFH0Mn6dPL6RpkUAAYaEAXC5tZJnNhTO5KiK3hgmjMgYmYBnrsxCE4zyP0YIvp6w3XgTw4SzPjWSBnqFOuSjDOcKm8CbjlgI_URakVMHavDApAOlHL2MXkS1A-rNWwtApgkiA6hpQnQDVudBUa9VFjwnFn7lJx7q6AdbVjXX1X9a9-I-HXKI9WFitYtu_Qp31chOu0a77Ws9Xy5tq43wDrgvIFg |
| linkProvider | Directory of Open Access Journals |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=The+current+state+of+art+in+program+obfuscations%3Adefinitions+of+obfuscation+security&rft.jtitle=Trudy+Instituta+sistemnogo+programmirovani%C3%A2&rft.au=N.+P.+Varnovsky&rft.au=V.+A.+Zakharov&rft.au=N.+N.+Kuzurin&rft.au=V.+A.+Shokurov&rft.date=2018-10-01&rft.pub=Russian+Academy+of+Sciences%2C+Ivannikov+Institute+for+System+Programming&rft.issn=2079-8156&rft.eissn=2220-6426&rft.volume=26&rft.issue=3&rft.spage=167&rft.epage=198&rft_id=info:doi/10.15514%2FISPRAS-2014-26%283%29-9&rft.externalDBID=DOA&rft.externalDocID=oai_doaj_org_article_cd3d503278fd4e19863981daecea3ffc |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2079-8156&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2079-8156&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2079-8156&client=summon |