{"title":"A New Obfuscation Scheme in Constructing Fuzzy Predicates","authors":"Ding Yi","doi":"10.1109/WCSE.2009.402","DOIUrl":null,"url":null,"abstract":"Based on the technique of code obfuscation in software protection, a new obfuscation scheme in constructing opaque predicates was proposed, which increased the complexity by employing the pseudo-random sequence and a group of Diophantine equations’ solutions to construct a family of parameterized opaque predicates. To protect the output of the opaque predicates, the data chain list was dynamically generated. Pseudo-random sequence was also used to disturb the attackers’ tracking debug. The complication of decompile was increased through block cryptosystems that convert the output of the opaque predicates into the corresponding judge conditions.","PeriodicalId":331155,"journal":{"name":"2009 WRI World Congress on Software Engineering","volume":"22 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2009-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2009 WRI World Congress on Software Engineering","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/WCSE.2009.402","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 3
Abstract
Based on the technique of code obfuscation in software protection, a new obfuscation scheme in constructing opaque predicates was proposed, which increased the complexity by employing the pseudo-random sequence and a group of Diophantine equations’ solutions to construct a family of parameterized opaque predicates. To protect the output of the opaque predicates, the data chain list was dynamically generated. Pseudo-random sequence was also used to disturb the attackers’ tracking debug. The complication of decompile was increased through block cryptosystems that convert the output of the opaque predicates into the corresponding judge conditions.