A survey of control-flow obfuscations

  • Authors:
  • Anirban Majumdar;Clark Thomborson;Stephen Drape

  • Affiliations:
  • Secure Systems Group, Department of Computer Science, The University of Auckland, Auckland, New Zealand;Secure Systems Group, Department of Computer Science, The University of Auckland, Auckland, New Zealand;Secure Systems Group, Department of Computer Science, The University of Auckland, Auckland, New Zealand

  • Venue:
  • ICISS'06 Proceedings of the Second international conference on Information Systems Security
  • Year:
  • 2006

Quantified Score

Hi-index 0.00

Visualization

Abstract

In this short survey, we provide an overview of obfuscation and then shift our focus to outlining various non-trivial control-flow obfuscation techniques. Along the way, we highlight two transforms having provable security properties: the dispatcher model and opaque predicates. We comment on the strength and weaknesses of these transforms and outline difficulties associated in generating generalised classes of these.