Two Obfuscation Methods by Controlling Calculation Amounts and by Table Function for Watermarks
نویسندگان
چکیده
This paper describes new two obfuscation methods the fist method can control computational complexity and the second method can achieve semantic obfuscation. The computational complexity can be strictly controlled by using the technique of RSA encryption. The computational complexity can be arbitrarily specified by the impossibility of factorization of prime number in RSA encryption method. Semantic obfuscation is achieved by transforming a function into a table function. The table function method only shows input data and output data .It hides all the intermediate processing data . Because the explicit function form is hidden, it is thought that analysis takes time. The computational complexity technique and semantic technique can be used at the same time, by embedding the table function into the program with computational complexity method.
منابع مشابه
A Software Fingerprinting Scheme for Java Using Classfiles Obfuscation
Embedding a personal identifier as a watermark to Java classfile is effective in order to protect copyrights of them. Monden et al.[1] proposed watermarking scheme that embeds arbitrary character sequence to the target method in a Java classfiles. But the scheme can be only used to embed the same watermark to each user’s classfiles. Therefore, if we apply this scheme for embedding each user’s p...
متن کاملMulti-Component-Multiphase Flash Calculations for Systems Containing Gas Hydrates by Direct Minimization of Gibbs Free Energy
The Michelsen stability and multiphase flash calculation by direct minimization of Gibbs free energy of the system at constant temperature and pressure, was used for systems containing gas hydrates. The solid hydrate phase was treated as a solid solution. The fugacities of all components of the hydrate phase were calculated as a function of compositions by the rearranged model of van der Wa...
متن کاملNew formula for Calculation of Cobalt-60 Percent Depth Dose
Introduction: On the basis of percent depth dose (PDD) calculation, the application of dosimetry in radiotherapy has an important role to play in reducing the chance of tumor recurrence. The aim of this study is to introduce a new formula for calculating the centeral axis percent depth doses of Cobalt-60 beam. Materials and Methods: In the present study, based on ...
متن کاملIndistinguishable Predicates: A New Tool for Obfuscation
Opaque predicates are a commonly used technique in program obfuscation, intended to add complexity to control flow and to insert dummy code or watermarks. We survey a number of methods to remove opaque predicates from obfuscated programs, hence defeating the intentions of the obfuscator. Our main contribution is an obfuscation technique that introduces opaque constant predicates that are provab...
متن کاملCalculation of the fuzzy reliability in Neishabour train disaster; a case study
Fuzzy reliability is often used in analyzing the reliability in the large industrial systems. In this paper, a relatively new method is presented to analyze Neishabour (also called Nishapur, a city in Iran) train disaster. In this regards, by using the certain and uncertain propositions, unreliability circuit of the system is depicted .Due to the inability to provide exact values for the unreli...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- IJCSA
دوره 8 شماره
صفحات -
تاریخ انتشار 2011