@inproceedings{b42f3a2d782b4fdc89cdb9e7f9afe260,
title = "Evaluation of tamper-resistant software deviating from structured programming rules",
abstract = "Recently the demand to make software resistant to manipulation is increasing. Similarly the demand to hide operation of software or to hide secret used in software is increasing. Software possessing such properties is called tamper-resistant software. One of methods to realize tamper-resistant software is obfuscation of software, and evaluating such software objectively and quantitatively has been an important research subject. One of the known objective and quantitative methods is the method using a parse tree of a compiler proposed in [GMMS00]. This method takes into account the complexity in one module of software but not the complexity originated from relationships among modules. We propose at first several obfuscation methods to create a complicated module structure which violates the structured programming rules. Then, we propose a new evaluation method which can measure the difficulty caused by complicated structure among modules. Its effectiveness is proven through experiments. One of experiments shows the grades obtained by the proposed evaluation well reflects the actual reading time required by analysts.",
author = "Hideaki Goto and Masahiro Mambo and Hiroki Shizuya and Yasuyoshi Watanabe",
year = "2001",
month = jan,
day = "1",
doi = "10.1007/3-540-47719-5_13",
language = "English",
isbn = "3540423001",
series = "Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)",
publisher = "Springer-Verlag",
pages = "145--158",
editor = "Vijay Varadharajan and Yi Mu",
booktitle = "Information Security and Privacy - 6th Australasian Conference, ACISP 2001 Sydney, Australia, July 11-13, 2001 Proceedings",
note = "6th Australasian Conference on Information Security and Privacy, ACISP 2001 ; Conference date: 11-07-2001 Through 13-07-2001",
}