Hopes, fears, and software obfuscation
- 25 February 2016
- journal article
- Published by Association for Computing Machinery (ACM) in Communications of the ACM
- Vol. 59 (3), 88-96
- https://doi.org/10.1145/2757276
Abstract
What does it mean to be secure?Keywords
This publication has 13 references indexed in Scilit:
- Zeroizing Without Low-Level Zeroes: New MMAP Attacks and their LimitationsPublished by Springer Science and Business Media LLC ,2015
- Protecting Obfuscation against Algebraic AttacksLecture Notes in Computer Science, 2014
- Functional encryptionCommunications of the ACM, 2012
- CryptDBCommunications of the ACM, 2012
- On the (im)possibility of obfuscating programsJournal of the ACM, 2012
- A One Round Protocol for Tripartite Diffie–HellmanJournal of Cryptology, 2004
- Bounded-width polynomial-size branching programs recognize exactly those languages in NC1Journal of Computer and System Sciences, 1989
- Probabilistic encryptionJournal of Computer and System Sciences, 1984
- A method for obtaining digital signatures and public-key cryptosystemsCommunications of the ACM, 1978
- New directions in cryptographyIEEE Transactions on Information Theory, 1976