New software protection product called “Obfuscation
Studio" is presented in the paper. Several obfuscating modules that
are already implemented are described. Some theoretical data is
presented, that shows the potency and effectiveness of described
obfuscation methods. “Obfuscation Studio" is being implemented for
protecting programs written for .NET platform, but the described
methods can also be interesting for other applications.
[1] Reverse Engineering Wizard. Microsoft .NET Framework SDK Tool
Developer's Documentation. Microsoft Corporation, 2001.
[2] Christian Collberg, Clark Thomborson, Douglas Low. A Taxanomy of
Obfuscating Transformations. Technical Report 148, Department of
Computer Science, University of Auckland. - 1997.
[3] S. Petryk, V. Yarmolik, Investigation of lexical method of obfuscation .
Informatics. Vol. 3, 2004, pp. 58-66.
[4] B. Barak, O. Goldreich, R. Impagliazzo, S. Rudich, A. Sahai, S.Vadhan
and K.Yang. On the (Im)possibility of Obfuscating Programs.
Electronic Colloquium on Computational Complexity (ECCC). - Vol.
8(057) - 2001.
[5] Prashant Shah. Code Obfuscation For Prevention of Malicious Reverse
Engineering Attacks. ECE 578, Computer and Network Security. -
1998.
[6] S. Petryk, Obfuscating by building predicates in. Proc. 10th Russian
conference in Ryazan. 2005. pp. 82-84.
[7] Douglas Low. Java Control Flow Obfuscation. University of Auckland.
- 1998.
[8] Sergei Petrik, Vyacheslav Yarmolik. Obfuscation by influence the
modules coupling. Automatic Control and Computer Sciences, to be
published.
[9] Arun Lakhotia, "Rule-based Approach to Computing Module
Cohesion". Proceedings 15th International Conference on Software
Engineering, Baltimore. - 1993.
[10] Shyam R. Chidamber, Chris F. Kemerer, A Metrics Suite for Object
Oriented Design. IEEE Transactions on software engineering. - vol. 20.
- 1994.
[1] Reverse Engineering Wizard. Microsoft .NET Framework SDK Tool
Developer's Documentation. Microsoft Corporation, 2001.
[2] Christian Collberg, Clark Thomborson, Douglas Low. A Taxanomy of
Obfuscating Transformations. Technical Report 148, Department of
Computer Science, University of Auckland. - 1997.
[3] S. Petryk, V. Yarmolik, Investigation of lexical method of obfuscation .
Informatics. Vol. 3, 2004, pp. 58-66.
[4] B. Barak, O. Goldreich, R. Impagliazzo, S. Rudich, A. Sahai, S.Vadhan
and K.Yang. On the (Im)possibility of Obfuscating Programs.
Electronic Colloquium on Computational Complexity (ECCC). - Vol.
8(057) - 2001.
[5] Prashant Shah. Code Obfuscation For Prevention of Malicious Reverse
Engineering Attacks. ECE 578, Computer and Network Security. -
1998.
[6] S. Petryk, Obfuscating by building predicates in. Proc. 10th Russian
conference in Ryazan. 2005. pp. 82-84.
[7] Douglas Low. Java Control Flow Obfuscation. University of Auckland.
- 1998.
[8] Sergei Petrik, Vyacheslav Yarmolik. Obfuscation by influence the
modules coupling. Automatic Control and Computer Sciences, to be
published.
[9] Arun Lakhotia, "Rule-based Approach to Computing Module
Cohesion". Proceedings 15th International Conference on Software
Engineering, Baltimore. - 1993.
[10] Shyam R. Chidamber, Chris F. Kemerer, A Metrics Suite for Object
Oriented Design. IEEE Transactions on software engineering. - vol. 20.
- 1994.
@article{"International Journal of Information, Control and Computer Sciences:62678", author = "Siarhei Petryk and Vyacheslav Yarmolik", title = "Obfuscation Studio Executive", abstract = "New software protection product called “Obfuscation
Studio" is presented in the paper. Several obfuscating modules that
are already implemented are described. Some theoretical data is
presented, that shows the potency and effectiveness of described
obfuscation methods. “Obfuscation Studio" is being implemented for
protecting programs written for .NET platform, but the described
methods can also be interesting for other applications.", keywords = "Coupling, obfuscation, predicates, renaming.", volume = "1", number = "10", pages = "3272-5", }