Obfuscation Studio Executive

New software protection product called “Obfuscation Studio" is presented in the paper. Several obfuscating modules that are already implemented are described. Some theoretical data is presented, that shows the potency and effectiveness of described obfuscation methods. “Obfuscation Studio" is being implemented for protecting programs written for .NET platform, but the described methods can also be interesting for other applications.




References:
[1] Reverse Engineering Wizard. Microsoft .NET Framework SDK Tool
Developer's Documentation. Microsoft Corporation, 2001.
[2] Christian Collberg, Clark Thomborson, Douglas Low. A Taxanomy of
Obfuscating Transformations. Technical Report 148, Department of
Computer Science, University of Auckland. - 1997.
[3] S. Petryk, V. Yarmolik, Investigation of lexical method of obfuscation .
Informatics. Vol. 3, 2004, pp. 58-66.
[4] B. Barak, O. Goldreich, R. Impagliazzo, S. Rudich, A. Sahai, S.Vadhan
and K.Yang. On the (Im)possibility of Obfuscating Programs.
Electronic Colloquium on Computational Complexity (ECCC). - Vol.
8(057) - 2001.
[5] Prashant Shah. Code Obfuscation For Prevention of Malicious Reverse
Engineering Attacks. ECE 578, Computer and Network Security. -
1998.
[6] S. Petryk, Obfuscating by building predicates in. Proc. 10th Russian
conference in Ryazan. 2005. pp. 82-84.
[7] Douglas Low. Java Control Flow Obfuscation. University of Auckland.
- 1998.
[8] Sergei Petrik, Vyacheslav Yarmolik. Obfuscation by influence the
modules coupling. Automatic Control and Computer Sciences, to be
published.
[9] Arun Lakhotia, "Rule-based Approach to Computing Module
Cohesion". Proceedings 15th International Conference on Software
Engineering, Baltimore. - 1993.
[10] Shyam R. Chidamber, Chris F. Kemerer, A Metrics Suite for Object
Oriented Design. IEEE Transactions on software engineering. - vol. 20.
- 1994.