Skip to main navigation Skip to search Skip to main content

Can a program reverse-engineer itself?

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

Shape-memory alloys are metal pieces that "remember" their original cold-forged shapes and return to the pre-deformed shape after heating. In this work we construct a software analogous of shape-memory alloys: programs whose code resists obfuscation. We show how to pour arbitrary functions into protective envelops that allow recovering the functions' exact initial code after obfuscation. We explicit the theoretical foundations of our method and provide a concrete implementation in Scheme.

Original languageEnglish
Title of host publicationCryptography and Coding - 13th IMA International Conference, IMACC 2011, Proceedings
Pages1-9
Number of pages9
DOIs
Publication statusPublished - 23 Dec 2011
Event13th IMA International Conference on Cryptography and Coding, IMACC 2011 - Oxford, United Kingdom
Duration: 12 Dec 201115 Dec 2011

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume7089 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference13th IMA International Conference on Cryptography and Coding, IMACC 2011
Country/TerritoryUnited Kingdom
CityOxford
Period12/12/1115/12/11

Fingerprint

Dive into the research topics of 'Can a program reverse-engineer itself?'. Together they form a unique fingerprint.

Cite this