Book section Open Access

Can a Program Reverse-Engineer Itself?

Amarilli, Antoine; Naccache, David; Rauzy, Pablo; Simion, Emil


MARC21 XML Export

<?xml version='1.0' encoding='UTF-8'?>
<record xmlns="http://www.loc.gov/MARC21/slim">
  <leader>00000nam##2200000uu#4500</leader>
  <controlfield tag="005">20190410034233.0</controlfield>
  <controlfield tag="001">32155</controlfield>
  <datafield tag="700" ind1=" " ind2=" ">
    <subfield code="0">(orcid)0000-0002-8651-6555</subfield>
    <subfield code="a">Naccache, David</subfield>
  </datafield>
  <datafield tag="700" ind1=" " ind2=" ">
    <subfield code="0">(orcid)0000-0002-6293-3231</subfield>
    <subfield code="a">Rauzy, Pablo</subfield>
  </datafield>
  <datafield tag="700" ind1=" " ind2=" ">
    <subfield code="a">Simion, Emil</subfield>
  </datafield>
  <datafield tag="856" ind1="4" ind2=" ">
    <subfield code="s">313751</subfield>
    <subfield code="z">md5:bed6b11c2377e19e9a783992d0eeec5c</subfield>
    <subfield code="u">https://zenodo.org/record/32155/files/article.pdf</subfield>
  </datafield>
  <datafield tag="542" ind1=" " ind2=" ">
    <subfield code="l">open</subfield>
  </datafield>
  <datafield tag="260" ind1=" " ind2=" ">
    <subfield code="c">2011-01-01</subfield>
  </datafield>
  <datafield tag="909" ind1="C" ind2="O">
    <subfield code="p">openaire</subfield>
    <subfield code="o">oai:zenodo.org:32155</subfield>
  </datafield>
  <datafield tag="909" ind1="C" ind2="4">
    <subfield code="y">2011</subfield>
    <subfield code="c">1-9</subfield>
    <subfield code="p">Lecture Notes in Computer Science</subfield>
  </datafield>
  <datafield tag="100" ind1=" " ind2=" ">
    <subfield code="0">(orcid)0000-0002-7977-4441</subfield>
    <subfield code="a">Amarilli, Antoine</subfield>
  </datafield>
  <datafield tag="245" ind1=" " ind2=" ">
    <subfield code="a">Can a Program Reverse-Engineer Itself?</subfield>
  </datafield>
  <datafield tag="540" ind1=" " ind2=" ">
    <subfield code="u">http://creativecommons.org/licenses/by/4.0/legalcode</subfield>
    <subfield code="a">Creative Commons Attribution 4.0 International</subfield>
  </datafield>
  <datafield tag="650" ind1="1" ind2="7">
    <subfield code="a">cc-by</subfield>
    <subfield code="2">opendefinition.org</subfield>
  </datafield>
  <datafield tag="520" ind1=" " ind2=" ">
    <subfield code="a">Shape-memory alloys are metal pieces that &amp;quot;remember&amp;quot; their original cold-forged shapes and return to the pre-deformed shape after heating. In this work we construct a software analogous of shape-memory alloys: programs whose code resists obfuscation. We show how to pour arbitrary functions into protective envelops that allow recovering the functions' exact initial code after obfuscation. We explicit the theoretical foundations of our method and provide a concrete implementation in Scheme.</subfield>
  </datafield>
  <datafield tag="024" ind1=" " ind2=" ">
    <subfield code="a">10.1007/978-3-642-25516-8_1</subfield>
    <subfield code="2">doi</subfield>
  </datafield>
  <datafield tag="980" ind1=" " ind2=" ">
    <subfield code="a">publication</subfield>
    <subfield code="b">section</subfield>
  </datafield>
</record>
51
20
views
downloads
Views 51
Downloads 20
Data volume 6.3 MB
Unique views 50
Unique downloads 20

Share

Cite as