@inproceedings{0626db27dc5046269a72bf0e4ab34f4a,
title = "A control flow obfuscation method to discourage malicious tampering of software codes",
abstract = "The paper presents a control flow obfuscation method to discourage reverse engineering and malicious tampering of software codes. Given the original source codes and desired obfuscation criteria, the proposed method works by decomposing the source codes into fragments and then applying various transforms to the code fragments. As the output of our method, the transformed fragments are re-assembled and obfuscated with the designated obfuscation criteria. Moreover, since only control flows are obfuscated with a sequence of transformations that produce equivalent results of the original fragments, the final output can still preserve the same execution results as the original codes. The proposed method can be combined with other security technologies like watermarking or fingerprinting and thus help discouraging software piracy by making watermarked information embedded in software codes difficult to be reverse engineered or tampered.",
keywords = "Control flow obfuscation, Intellectual property protection, Reverse engineering, Software obfuscation, Tamper-resistance",
author = "Yu-Lun Huang and Ho, {F. S.} and Tsai, {H. Y.} and Kao, {H. M.}",
year = "2006",
month = dec,
day = "1",
doi = "10.1145/1128817.1128878",
language = "English",
isbn = "1595932720",
series = "Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security, ASIACCS '06",
booktitle = "Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security, ASIACCS '06",
note = "null ; Conference date: 21-03-2007 Through 24-03-2007",
}