Anckaert, B., Sutter, B. D., and Bosschere, K. D. (2004).
Software piracy prevention through diversity. In DRM
’04: Proceedings of the 4th ACM Workshop on Digi-
tal Rights Management, pages 63–71, New York, NY,
USA. ACM Press.
Aucsmith, D. (1996). Tamper resistant software: An im-
plementation. Information Hiding, Lecture Notes in
Computer Science, 1174:317–333.
Barak, B., Goldreich, O., Impagliazzo, R., Rudich, S., Sa-
hai, A., Vadhan, S., and Yang, K. (2001). On the
(im)possibility of obfuscating programs. In Electronic
Colloquium on Computational Complexity, volume
2139, pages 1–18.
Chen, Y., Venkatesan, R., Cary, M., Pang, R., Sinha, S.,
and Jakubowski, M. H. (2002). Oblivious hashing:
A stealthy software integrity verification primitive.
In Information Hiding 2002, Noordwijkerhout, The
Netherlands.
Collberg, C., Thomborson, C., and Low, D. (1997). A tax-
onomy of obfuscating transformations. Technical Re-
port 148, Department of Computer Science, The Uni-
versity of Auckland, New Zealand.
Collberg, C., Thomborson, C., and Low, D. (1998a). Break-
ing abstractions and unstructuring data structures. In
International Conference on Computer Languages,
pages 28–38.
Collberg, C., Thomborson, C., and Low, D. (1998b). Man-
ufacturing cheap, resilient, and stealthy opaque con-
structs. In Principles of Programming Languages,
POPL’98, pages 184–196.
Dedi´c, N., Jakubowski, M. H., and Venkatesan, R. (2007).
A graph game model for software tamper protection.
In Proceedings of the 2007 Information Hiding Work-
shop.
El-khalil, R. and Keromytis, A. D. (2004). Hydan: Hid-
ing information in program binaries. In International
Conf. on Information and Communications Security
(ICICS).
Goldreich, O. and Ostrovsky, R. (1996). Software protec-
tion and simulation on oblivious RAMs. Journal of
the ACM, 43(3):431–473.
Goldwasser, S. and Kalai, Y. T. (2005). On the impossibil-
ity of obfuscation with auxiliary input. In FOCS ’05:
Proceedings of the 46th IEEE Symposium on Founda-
tions of Computer Science.
Horne, B., Matheson, L. R., Sheehan, C., and Tarjan, R. E.
(2001). Dynamic self-checking techniques for im-
proved tamper resistance. In Digital Rights Manage-
ment Workshop, pages 141–159.
Jacob, M., Jakubowski, M. H., and Venkatesan, R. (2007).
Towards integral binary execution: Implementing
oblivious hashing using overlapped instruction encod-
ings. In 2007 ACM Multimedia and Security Work-
shop, Dallas, TX.
Lynn, B., Prabhakaran, M., and Sahai, A. (2004). Positive
results and techniques for obfuscation. In Eurocrypt
’04.
Menezes, A. J., Vanstone, S. A., and Oorschot, P. C. V.
(1996). Handbook of Applied Cryptography. CRC
Press, Inc., Boca Raton, FL, USA.
Microsoft Corporation (2008). Phoenix compiler frame-
work.
Tan, G., Chen, Y., and Jakubowski, M. H. (2006). De-
layed and controlled failures in tamper-resistant soft-
ware. In Proceedings of the 2006 Information Hiding
Workshop.
Wang, C. (2000). A Security Architecture for Survivability
Mechanisms. PhD thesis, University of Virginia.
Wang, C., Hill, J., Knight, J., and Davidson, J. (2000). Soft-
ware tamper resistance: Obstructing static analysis of
programs. Technical Report CS-2000-12, University
of Virginia.
Wee, H. (2005). On obfuscating point functions. In STOC
’05: Proceedings of the Thirty-seventh Annual ACM
Symposium on Theory of Computing, pages 523–532,
New York, NY, USA. ACM Press.
Wolfram, S. (2002). A New Kind of Science. Wolfram Me-
dia Inc., Champaign, IL, USA.
SECRYPT 2009 - International Conference on Security and Cryptography
368