Abstract
As various computers are connected into a world wide network, software is a target of copyright pirates, attackers, or even terrorists, as a result, software protections become a more and more important issue for software users and developers. There are some technical measures for software protections, such as hardware-based protections and software-based techniques [1], etc. Software obfuscation [2] is one of these measures to protect software from unauthorized modification by making software more obscure so that it is hard for potential attackers to understand the obfuscated software. There are several algorithms of software obfuscation such as layout transformation, computation transformation, ordering transformation, and data transformation [2]. Variable transformation is a major method of data transformation to transform software into a new semantically equivalent one that is hard for attackers to understand the true meaning of variables in software.
Research supported in part by the New Economy Research Fund of New Zealand.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Zhu, W., Thomborson, C., Wang, F.-Y.: A survey of software watermarking. In: Kantor, P., Muresan, G., Roberts, F., Zeng, D.D., Wang, F.-Y., Chen, H., Merkle, R.C. (eds.) ISI 2005. LNCS, vol. 3495, pp. 454–458. Springer, Heidelberg (2005)
Collberg, C., Thomborson, C., Low, D.: A taxonomy of obfuscating transformations, Tech. Report, No.148, Dept. of Computer Sciences, Univ. of Auckland (1997)
Chow, et al.: Tamper resistant software encoding, US patent 6594761, 1-32 (2003)
Zhu, W., Thomborson, C.: A provable scheme for homomorphic obfuscation in software security. In: Thomborson, C. (ed.) The IASTED International Conference on Communication, Network and Information Security, CNIS 2005, pp. 208–212 (2005)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2006 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Zhu, W., Thomborson, C., Wang, FY. (2006). Applications of Homomorphic Functions to Software Obfuscation. In: Chen, H., Wang, FY., Yang, C.C., Zeng, D., Chau, M., Chang, K. (eds) Intelligence and Security Informatics. WISI 2006. Lecture Notes in Computer Science, vol 3917. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11734628_18
Download citation
DOI: https://doi.org/10.1007/11734628_18
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-33361-6
Online ISBN: 978-3-540-33362-3
eBook Packages: Computer ScienceComputer Science (R0)