Mathematical and software tools for programs obfuscation
Prikladnaâ diskretnaâ matematika, no. 10 (2009), pp. 52-53.

Voir la notice de l'article provenant de la source Math-Net.Ru

The paper presents an universal representation of computer programs that contains all the necessary information for obfuscation, and the software implementation of the representation is suggested. This representation applies to programs executed in different environments and allows to use different analysis methods of programs that must be protected. Also the method for the code obfuscation by separating data streams is proposed.
@article{PDM_2009_10_a25,
     author = {A. G. Pozdeev and V. N. Krivopalov and E. V. Romashkin and E. D. Radchenko},
     title = {Mathematical and software tools for programs obfuscation},
     journal = {Prikladna\^a diskretna\^a matematika},
     pages = {52--53},
     publisher = {mathdoc},
     number = {10},
     year = {2009},
     language = {ru},
     url = {http://geodesic.mathdoc.fr/item/PDM_2009_10_a25/}
}
TY  - JOUR
AU  - A. G. Pozdeev
AU  - V. N. Krivopalov
AU  - E. V. Romashkin
AU  - E. D. Radchenko
TI  - Mathematical and software tools for programs obfuscation
JO  - Prikladnaâ diskretnaâ matematika
PY  - 2009
SP  - 52
EP  - 53
IS  - 10
PB  - mathdoc
UR  - http://geodesic.mathdoc.fr/item/PDM_2009_10_a25/
LA  - ru
ID  - PDM_2009_10_a25
ER  - 
%0 Journal Article
%A A. G. Pozdeev
%A V. N. Krivopalov
%A E. V. Romashkin
%A E. D. Radchenko
%T Mathematical and software tools for programs obfuscation
%J Prikladnaâ diskretnaâ matematika
%D 2009
%P 52-53
%N 10
%I mathdoc
%U http://geodesic.mathdoc.fr/item/PDM_2009_10_a25/
%G ru
%F PDM_2009_10_a25
A. G. Pozdeev; V. N. Krivopalov; E. V. Romashkin; E. D. Radchenko. Mathematical and software tools for programs obfuscation. Prikladnaâ diskretnaâ matematika, no. 10 (2009), pp. 52-53. http://geodesic.mathdoc.fr/item/PDM_2009_10_a25/

[1] Collberg C., Thomborson C., Low D., Manufacturing cheap, resilient, and stealthy opaque constructs, Proc. Symp. Principles of Programming Languages (POPL'98), 1998, Jan.

[2] Collberg C., Thomborson C., Low D., Taxonomy of Obfuscating Transformations, Rezhim dostupa: , svobodnyi http://www.cs.arizona.edu/collberg/ Research/Publications/CollbergThomborsonLow97a/index.html

[3] Chernov A. V., Issledovanie i razrabotka metodologii maskirovki programm, Dis. kand. fiz.-mat. nauk, Mosk. gos. un-t im. M. V. Lomonosova, M., 2003, 133 pp.

[4] Lifshits Yu. M., Zaputyvanie (obfuskatsiya) programm. Obzor., SPb. otd. Mat. inst. im. V. A. Steklova RAN, SPb., 2004; Режим доступа: , свободный http://logic.pdmi.ras.ru/~yura/of/survey1.pdf

[5] Chernov A. V., Analiz zaputyvayuschikh preobrazovanii programm. Biblioteka analiticheskoi informatsii [Elektronnyi resurs], Rezhim dostupa: , svobodnyi http://www.citforum.ru/security/articles/analysis/

[6] Barak B., Goldreich O., Impagliazzo R. et al., “On the (Im)possibility of Obfuscation Programs”, LNCS, 2139, 2001, 1–18 | MR | Zbl