Papers about "Algorithm hiding" ?

Valery Pryamikov valery.pryamikov at harper.no
Tue May 31 01:43:37 EDT 2005


> -----Original Message-----
> Hadmut Danisch wrote:
> 
> ...
> Plenty of research has been done about information hiding.
> But this special court case requires "algorithm hiding" as a kind of
> response. Do you know where to look for papers about this subject?
> ...

Here is the list that you can start with:

[1] Boaz Barak, Oded Goldreich, Russell Impagliazzo, Steven Rudich, Amit
Sahai, Sali Vadhan, Ke Yang. On the (im)possibility of obfuscating
programs. In Proceedings of CRYPTO 2001.
[2] Benjamin Lynn, Manoj Prabhakaran, Amit Sahai. Positive Results and
Techniques for Obfuscation. In Proceedings of Eurocrypt 2004. 
[3] Hoeteck Wee. On Obfuscating Point Functions. Computer Science
Division University of California, Berkeley. Jan 2005
[4] Christian Collberg, Clark Thomborson. Watermarking, tamper-proofing
and obfuscation - tools for software protection. IEEE Transactions on
software engineering, vol.28, No.8, August 2002.
[5] Christian Collberg, Clark Thomborson. Watermarking, tamper-proofing
and obfuscation - tools for software protection. Technical Report
TR00-03, The Department of Computer Science, University of Arizona,
February 2000.
[6] Christian Collberg, Clark Thomborson, Douglas Low. Breaking
Abstractions and Unstructuring Data Structures. IEEE International
Conference on Computer Languages, May 1998. 
[7] Christian Collberg, Clark Thoborson, Douglas Low. Manufacturing
Cheap, Resilient, and Stealthy Opaque Constructs. Principles of
Programming Languages 1998, POPL'98, January 1988.
[8] Christian Collberg, Clark Thomborson, Douglas Low. A Taxonomy of
Obfuscating Transformations. Technical Report 148, Department of
Computer Science, The University of Auckland. July 1997. 
[9] Chenxi Wang, Jonathan Hill, John Knight, Jack Davidson. Protection
of Software-based Survivability Mechanisms. International Conference of
Dependable Systems and Networks. July 2001. 
[10] Chenxi Wang. A Security Architecture for Survivability Mechanisms.
PhD Dissertation, Department of Computer Science, University of
Virginia, October 2000.
[11] Chenxi Wang, Jonathan Hill, John Knight, Jack Davidson. Software
Tamper Resistance: Obstructing Static Analysis of Programs. Technical
Report CS-2000-12, Department of Computer Science, University of
Virginia. May 2000.  
[12] Cullen Linn, Saumya Debray. Obfuscation of Executable Code to
Improve Resistance to Static Disassembly. ACM Conference on Computer and
Communications Security (CCS 2003), October 2003, pp. 290-299
[13] Fritz Hohl. A Framework to Protect Mobile Agents by Using Reference
States. Proceedings of the 20th International Conference on Distributed
Computing Systems (ICDCS 2000), pp. 410-417, 2000.
[14] Gregory Wroblewski. General Method of Program Code Obfuscation. PhD
Dissertation, Wroclaw. 2002.
[15] S. Chow, H. Johnson, P.C. van Oorschot, P Eisen. A White-Box DES
implementation for DRM applications. In Proceedings of ACM CCS-9
Workshop DRM. 2002
[16] Matthias Jacom, Dan Boneh, Edard Feltin. Attacking an obfuscated
cipher by injecting faults. In Proceedings of ACM CCS-9 Workshop DRM.
2002. 
[17] Yuval Ishai, Amit Sahai, David Wagner. Private Circuits: Securing
Hardware against Probing Attacks. In Proceedings of CRYPTO 2003.
[18] Markus Kuhn, Oliver Kommerling. Design Principles for
Tamper-Resistant Smartcard Processors. USENIX Workshop on Smartcard
Technology proceedings, Chicago, Illinois, USA, May 10-11, 1999.
[19] Ross Anderson, Markus Kuhn. Tamper resistance - a Cautionary Note.
The Second USENIX Workshop on Electronic Commerce Proceedings, Oakland ,
California, November 18-21 1996, pp 1-11.
[20] Gael Hachez. A Comparative Study of Software Protection Tools
Suited for E-Commerce with Contributions to Software Watermarking and
Smart Cards.
PhD thesis, Faculte des Sciences Appliquees Laboratoire de
Microelectronique. Universite Catholique de Louvain. March 2003.
[21] T.-C. Lin, M. Hsiang Hsu, F.-Y. Kuo, and P.-C. Sun. An Intention
Model-based Study of Software Piracy. In 32nd Annual Hawaii
International Conference on System Sciences (HICSS-32). IEEE Computer
Society, January 1999.
[22] Amit Sethi. Digital Rights Management and Code Obfuscation. Thesis
in fulfillment of degree of Master of Mathematics. University of
Waterloo, Ontario, Canada. 2003.
[23] M. Kunin. Why do Software Manufactures Tolerate Piracy in
Transition and Less Developed Countries? A theoretical model. Discussion
Paper Series 2001-75, JEL classification: O34;L20. Center for Economic
Research, Charles University and the Academy of Sciences, Czech
Republic, October 2001.
[24] Christian Collberg. SandMark Algorithms. January 28, 2003
[25] Christian Collberg, Ginger Myles, Michael Stepp. Cheating Cheating
Detectors. Department Computer Science University of Arizona. Technical
Report TR04-05. March 3, 2004
[26] James R. Gosler. Software Protection: Myth or Reality? Sandia
National Laboratory. Advances in Cryptology - CRYPTO'85. 1985.  
[27] Kelly Heffner, Christian Collberg. The Obfuscation Executive.
Department of Computer Science, University of Arizona. Technical Report
TR04-03. 2004.
[28] Tapas Ranjan Sahoo, Christian Collberg. Software Watermarking in
the Frequency Domain: Implementation, Analysis, and Attacks. Department
of Computer Science,
University of Arizona. Technical Report TR04-07. March 3, 2004
[29] Christian Collberg, Clark Thomborson, Gregg M. Townsend. Dynamic
Graph-Based Software Watermarking. Technical Report TR04-08. April 28,
2004
[30] Satoshi Hada. Zero-Knowledge and Code Obfuscation. Tokyo Research
Laboratory, IBM Research. In Proceedings of ASIACRYPT 2000.
[31] Larry D'Anna, Brian Matt, Andrew Reisse, Tom Van Vleck, Steve
Schwab, Patrick LeBlanc. Self-Protecting Mobile Agents Obfuscation
Report. Final report. Network Associates Laboratories. Report #03-015.
June 30, 2003
[32] Julien P. Stern, Gael Hachez, Francois Koeune, Jean-Jacques
Quisquater. Robust Object Watermarking: Application to Code. UCL Crypto
Group, Laboratoire de Recherche en Informatique, Universite de
Paris-Sud, France. 
[33] Toshio Ogiso, Yusuke Sakabe, Masakazu Soshi, and Atsuko Miyaji.
Software Tamper Resistance Based on the Difficulty of Interprocedural
Analysis.
[34] Jennifer L. Wong, Darko Kirovski, Miodrag Potkonjak. Computational
Forensic Techniques for Intellectual Property Protection.


-Valery
http://www.harper.no/valery


---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo at metzdowd.com



More information about the cryptography mailing list