C source code obfuscator
Kybernetika, Tome 48 (2012) no. 3, pp. 494-501 Cet article a éte moissonné depuis la source Czech Digital Mathematics Library

Voir la notice de l'article

Obfuscation is a process that changes the code, but without any change to semantics. This process can be done on two levels. On the binary code level, where the instructions or control flow are modified, or on the source code level, where we can change only a structure of code to make it harder to read or we can make adjustments to reduce chance of successful reverse engineering.
Obfuscation is a process that changes the code, but without any change to semantics. This process can be done on two levels. On the binary code level, where the instructions or control flow are modified, or on the source code level, where we can change only a structure of code to make it harder to read or we can make adjustments to reduce chance of successful reverse engineering.
Classification : 68N15
Keywords: obfuscation; source code; malware
@article{KYB_2012_48_3_a9,
     author = {\v{D}urfina, Luk\'a\v{s} and Kol\'a\v{r}, Du\v{s}an},
     title = {C source code obfuscator},
     journal = {Kybernetika},
     pages = {494--501},
     year = {2012},
     volume = {48},
     number = {3},
     language = {en},
     url = {http://geodesic.mathdoc.fr/item/KYB_2012_48_3_a9/}
}
TY  - JOUR
AU  - Ďurfina, Lukáš
AU  - Kolář, Dušan
TI  - C source code obfuscator
JO  - Kybernetika
PY  - 2012
SP  - 494
EP  - 501
VL  - 48
IS  - 3
UR  - http://geodesic.mathdoc.fr/item/KYB_2012_48_3_a9/
LA  - en
ID  - KYB_2012_48_3_a9
ER  - 
%0 Journal Article
%A Ďurfina, Lukáš
%A Kolář, Dušan
%T C source code obfuscator
%J Kybernetika
%D 2012
%P 494-501
%V 48
%N 3
%U http://geodesic.mathdoc.fr/item/KYB_2012_48_3_a9/
%G en
%F KYB_2012_48_3_a9
Ďurfina, Lukáš; Kolář, Dušan. C source code obfuscator. Kybernetika, Tome 48 (2012) no. 3, pp. 494-501. http://geodesic.mathdoc.fr/item/KYB_2012_48_3_a9/

[1] Free Software Foundation, Inc.: Volatiles – Using the GNU Compiler Collection. 2010, http://gcc.gnu.org/onlinedocs/gcc/Volatiles.html

[2] Harbour, N.: Advanced Software Armoring and Polymorphic Kung-Fu. DEFCON 16, 2008.

[3] Intel: Intel Architecture Software Developer's Manual Volume 2: Instruction Set Reference. 1999, http://download.intel.com/design/intarch/manuals/24319101.pdf

[4] Karnik, A., Goswami, S., Guha, R.: Detecting Obfuscated Viruses Using Cosine Similarity Analysis. Modelling Simulation, 2007.

[5] Low, D.: Protecting Java code via code obfuscation. In: Crossroads – Special Issue on Robotics, 1998.

[6] Microsoft: MSDN Library. http://msdn.microsoft.com/en-us/library/ms123401.aspx

[7] Moser, A., Kruegel, Ch., Kirda, E.: Limits of static analysis for malware detection. In: Computer Security Applications Conference, 2007.

[8] Savarese, Ch., Hart, B.: The Caesar Cipher. 1999, http://www.cs.trincoll.edu/ crypto/historical/caesar.html.