> -----Original Message----- > Hadmut Danisch wrote: > > ... > Plenty of research has been done about information hiding. > But this special court case requires "algorithm hiding" as a kind of > response. Do you know where to look for papers about this subject? > ...
Here is the list that you can start with: [1] Boaz Barak, Oded Goldreich, Russell Impagliazzo, Steven Rudich, Amit Sahai, Sali Vadhan, Ke Yang. On the (im)possibility of obfuscating programs. In Proceedings of CRYPTO 2001. [2] Benjamin Lynn, Manoj Prabhakaran, Amit Sahai. Positive Results and Techniques for Obfuscation. In Proceedings of Eurocrypt 2004. [3] Hoeteck Wee. On Obfuscating Point Functions. Computer Science Division University of California, Berkeley. Jan 2005 [4] Christian Collberg, Clark Thomborson. Watermarking, tamper-proofing and obfuscation - tools for software protection. IEEE Transactions on software engineering, vol.28, No.8, August 2002. [5] Christian Collberg, Clark Thomborson. Watermarking, tamper-proofing and obfuscation - tools for software protection. Technical Report TR00-03, The Department of Computer Science, University of Arizona, February 2000. [6] Christian Collberg, Clark Thomborson, Douglas Low. Breaking Abstractions and Unstructuring Data Structures. IEEE International Conference on Computer Languages, May 1998. [7] Christian Collberg, Clark Thoborson, Douglas Low. Manufacturing Cheap, Resilient, and Stealthy Opaque Constructs. Principles of Programming Languages 1998, POPL'98, January 1988. [8] Christian Collberg, Clark Thomborson, Douglas Low. A Taxonomy of Obfuscating Transformations. Technical Report 148, Department of Computer Science, The University of Auckland. July 1997. [9] Chenxi Wang, Jonathan Hill, John Knight, Jack Davidson. Protection of Software-based Survivability Mechanisms. International Conference of Dependable Systems and Networks. July 2001. [10] Chenxi Wang. A Security Architecture for Survivability Mechanisms. PhD Dissertation, Department of Computer Science, University of Virginia, October 2000. [11] Chenxi Wang, Jonathan Hill, John Knight, Jack Davidson. Software Tamper Resistance: Obstructing Static Analysis of Programs. Technical Report CS-2000-12, Department of Computer Science, University of Virginia. May 2000. [12] Cullen Linn, Saumya Debray. Obfuscation of Executable Code to Improve Resistance to Static Disassembly. ACM Conference on Computer and Communications Security (CCS 2003), October 2003, pp. 290-299 [13] Fritz Hohl. A Framework to Protect Mobile Agents by Using Reference States. Proceedings of the 20th International Conference on Distributed Computing Systems (ICDCS 2000), pp. 410-417, 2000. [14] Gregory Wroblewski. General Method of Program Code Obfuscation. PhD Dissertation, Wroclaw. 2002. [15] S. Chow, H. Johnson, P.C. van Oorschot, P Eisen. A White-Box DES implementation for DRM applications. In Proceedings of ACM CCS-9 Workshop DRM. 2002 [16] Matthias Jacom, Dan Boneh, Edard Feltin. Attacking an obfuscated cipher by injecting faults. In Proceedings of ACM CCS-9 Workshop DRM. 2002. [17] Yuval Ishai, Amit Sahai, David Wagner. Private Circuits: Securing Hardware against Probing Attacks. In Proceedings of CRYPTO 2003. [18] Markus Kuhn, Oliver Kommerling. Design Principles for Tamper-Resistant Smartcard Processors. USENIX Workshop on Smartcard Technology proceedings, Chicago, Illinois, USA, May 10-11, 1999. [19] Ross Anderson, Markus Kuhn. Tamper resistance - a Cautionary Note. The Second USENIX Workshop on Electronic Commerce Proceedings, Oakland , California, November 18-21 1996, pp 1-11. [20] Gael Hachez. A Comparative Study of Software Protection Tools Suited for E-Commerce with Contributions to Software Watermarking and Smart Cards. PhD thesis, Faculte des Sciences Appliquees Laboratoire de Microelectronique. Universite Catholique de Louvain. March 2003. [21] T.-C. Lin, M. Hsiang Hsu, F.-Y. Kuo, and P.-C. Sun. An Intention Model-based Study of Software Piracy. In 32nd Annual Hawaii International Conference on System Sciences (HICSS-32). IEEE Computer Society, January 1999. [22] Amit Sethi. Digital Rights Management and Code Obfuscation. Thesis in fulfillment of degree of Master of Mathematics. University of Waterloo, Ontario, Canada. 2003. [23] M. Kunin. Why do Software Manufactures Tolerate Piracy in Transition and Less Developed Countries? A theoretical model. Discussion Paper Series 2001-75, JEL classification: O34;L20. Center for Economic Research, Charles University and the Academy of Sciences, Czech Republic, October 2001. [24] Christian Collberg. SandMark Algorithms. January 28, 2003 [25] Christian Collberg, Ginger Myles, Michael Stepp. Cheating Cheating Detectors. Department Computer Science University of Arizona. Technical Report TR04-05. March 3, 2004 [26] James R. Gosler. Software Protection: Myth or Reality? Sandia National Laboratory. Advances in Cryptology - CRYPTO'85. 1985. [27] Kelly Heffner, Christian Collberg. The Obfuscation Executive. Department of Computer Science, University of Arizona. Technical Report TR04-03. 2004. [28] Tapas Ranjan Sahoo, Christian Collberg. Software Watermarking in the Frequency Domain: Implementation, Analysis, and Attacks. Department of Computer Science, University of Arizona. Technical Report TR04-07. March 3, 2004 [29] Christian Collberg, Clark Thomborson, Gregg M. Townsend. Dynamic Graph-Based Software Watermarking. Technical Report TR04-08. April 28, 2004 [30] Satoshi Hada. Zero-Knowledge and Code Obfuscation. Tokyo Research Laboratory, IBM Research. In Proceedings of ASIACRYPT 2000. [31] Larry D'Anna, Brian Matt, Andrew Reisse, Tom Van Vleck, Steve Schwab, Patrick LeBlanc. Self-Protecting Mobile Agents Obfuscation Report. Final report. Network Associates Laboratories. Report #03-015. June 30, 2003 [32] Julien P. Stern, Gael Hachez, Francois Koeune, Jean-Jacques Quisquater. Robust Object Watermarking: Application to Code. UCL Crypto Group, Laboratoire de Recherche en Informatique, Universite de Paris-Sud, France. [33] Toshio Ogiso, Yusuke Sakabe, Masakazu Soshi, and Atsuko Miyaji. Software Tamper Resistance Based on the Difficulty of Interprocedural Analysis. [34] Jennifer L. Wong, Darko Kirovski, Miodrag Potkonjak. Computational Forensic Techniques for Intellectual Property Protection. -Valery http://www.harper.no/valery --------------------------------------------------------------------- The Cryptography Mailing List Unsubscribe by sending "unsubscribe cryptography" to [EMAIL PROTECTED]