How does code obfuscation impact energy usage?

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Modelling the Impact of Code Obfuscation on Energy Usage

Advancements in computing and communication technologies have given rise to low-cost embedded devices with applications in diverse domains such as Smarthome, industrial automation, healthcare, transportation etc. These devices are power-constrained which emphasizes the need for lightweight security solutions. Code obfuscation has been demonstrated to provide time-limited protection of source co...

متن کامل

Code Obfuscation Literature Survey

In this paper we survey the current literature on code obfuscation and review current practices as well as applications. We analyze the different obfuscation techniques in relation to protection of intellectual property and the hiding of malicious code. Surprisingly, the same techniques used to thwart reverse engineers are used to hide malicious code from virus scanners. Additionally, obfuscati...

متن کامل

Code and Proof Obfuscation

ions Since we want our analysis to be sound (i.e. to nd all errors), we need to abstract in a conservative manner, all properties being represented by an over-approximation of it. Moreover, we would like to have a unique best abstract property for each concrete property. Given a concrete complete lattice (D,⊆, ⋂ , ⋂ ), an abstraction of D is thus a sublattice D with induced order and bounds suc...

متن کامل

CONFUSE: LLVM-based Code Obfuscation

In the past decade, code obfuscation techniques have become increasingly popular due to their wide applications on malware and the numerous violations of intellectual property caused by reverse engineering. In this work, we examine common techniques used for code obfuscation and provide an outline of the design principles of our tool Confuse. Confuse is an LLVM tool which modifies the standard ...

متن کامل

Zero-Knowledge and Code Obfuscation

In this paper, we investigate the gap between auxiliary-input zero-knowledge (AIZK) and blackbox-simulation zero-knowledge (BSZK). It is an interesting open problem whether or not there exists a protocol which achieves AIZK, but not BSZK. We show that the existence of such a protocol is closely related to the existence of secure code obfuscators. A code obfuscator is used to convert a code into...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Journal of Software: Evolution and Process

سال: 2016

ISSN: 2047-7473,2047-7481

DOI: 10.1002/smr.1762