Two Obfuscation Methods by Controlling Calculation Amounts and by Table Function for Watermarks

نویسندگان

  • Yuanyu Wei
  • Kazuo Ohzeki
چکیده

This paper describes new two obfuscation methods the fist method can control computational complexity and the second method can achieve semantic obfuscation. The computational complexity can be strictly controlled by using the technique of RSA encryption. The computational complexity can be arbitrarily specified by the impossibility of factorization of prime number in RSA encryption method. Semantic obfuscation is achieved by transforming a function into a table function. The table function method only shows input data and output data .It hides all the intermediate processing data . Because the explicit function form is hidden, it is thought that analysis takes time. The computational complexity technique and semantic technique can be used at the same time, by embedding the table function into the program with computational complexity method.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Software Fingerprinting Scheme for Java Using Classfiles Obfuscation

Embedding a personal identifier as a watermark to Java classfile is effective in order to protect copyrights of them. Monden et al.[1] proposed watermarking scheme that embeds arbitrary character sequence to the target method in a Java classfiles. But the scheme can be only used to embed the same watermark to each user’s classfiles. Therefore, if we apply this scheme for embedding each user’s p...

متن کامل

Multi-Component-Multiphase Flash Calculations for Systems Containing Gas Hydrates by Direct Minimization of Gibbs Free Energy

The Michelsen stability and multiphase flash calculation by direct minimization of Gibbs free energy of the system at constant temperature and pressure, was used for systems containing gas hydrates. The solid hydrate phase was treated as a solid solution. The fugacities of all components of the hydrate phase were calculated as a function of compositions by the rearranged model of van der Wa...

متن کامل

New formula for Calculation of Cobalt-60 Percent Depth Dose

Introduction:  On  the  basis  of  percent  depth  dose  (PDD)  calculation,  the  application  of  dosimetry  in  radiotherapy  has  an  important  role  to  play  in  reducing  the  chance  of  tumor  recurrence. The aim of this study is to introduce a new formula for calculating the centeral axis  percent depth doses of Cobalt-60 beam.   Materials and Methods: In the present study, based on ...

متن کامل

Indistinguishable Predicates: A New Tool for Obfuscation

Opaque predicates are a commonly used technique in program obfuscation, intended to add complexity to control flow and to insert dummy code or watermarks. We survey a number of methods to remove opaque predicates from obfuscated programs, hence defeating the intentions of the obfuscator. Our main contribution is an obfuscation technique that introduces opaque constant predicates that are provab...

متن کامل

Calculation of the fuzzy reliability in Neishabour train disaster; a case study

Fuzzy reliability is often used in analyzing the reliability in the large industrial systems. In this paper, a relatively new method is presented to analyze Neishabour (also called Nishapur, a city in Iran) train disaster. In this regards, by using the certain and uncertain propositions, unreliability circuit of the system is depicted .Due to the inability to provide exact values for the unreli...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • IJCSA

دوره 8  شماره 

صفحات  -

تاریخ انتشار 2011