How does code obfuscation impact energy usage?
نویسندگان
چکیده
منابع مشابه
Modelling the Impact of Code Obfuscation on Energy Usage
Advancements in computing and communication technologies have given rise to low-cost embedded devices with applications in diverse domains such as Smarthome, industrial automation, healthcare, transportation etc. These devices are power-constrained which emphasizes the need for lightweight security solutions. Code obfuscation has been demonstrated to provide time-limited protection of source co...
متن کاملCode Obfuscation Literature Survey
In this paper we survey the current literature on code obfuscation and review current practices as well as applications. We analyze the different obfuscation techniques in relation to protection of intellectual property and the hiding of malicious code. Surprisingly, the same techniques used to thwart reverse engineers are used to hide malicious code from virus scanners. Additionally, obfuscati...
متن کاملCode and Proof Obfuscation
ions Since we want our analysis to be sound (i.e. to nd all errors), we need to abstract in a conservative manner, all properties being represented by an over-approximation of it. Moreover, we would like to have a unique best abstract property for each concrete property. Given a concrete complete lattice (D,⊆, ⋂ , ⋂ ), an abstraction of D is thus a sublattice D with induced order and bounds suc...
متن کاملCONFUSE: LLVM-based Code Obfuscation
In the past decade, code obfuscation techniques have become increasingly popular due to their wide applications on malware and the numerous violations of intellectual property caused by reverse engineering. In this work, we examine common techniques used for code obfuscation and provide an outline of the design principles of our tool Confuse. Confuse is an LLVM tool which modifies the standard ...
متن کاملZero-Knowledge and Code Obfuscation
In this paper, we investigate the gap between auxiliary-input zero-knowledge (AIZK) and blackbox-simulation zero-knowledge (BSZK). It is an interesting open problem whether or not there exists a protocol which achieves AIZK, but not BSZK. We show that the existence of such a protocol is closely related to the existence of secure code obfuscators. A code obfuscator is used to convert a code into...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of Software: Evolution and Process
سال: 2016
ISSN: 2047-7473,2047-7481
DOI: 10.1002/smr.1762