Bitcode Obfuscation - Protecting Software Without Source Code Access (2022)

By Rafie Shamsaasef, Lex Aaron Anderson; CommScope

In this paper, we offer technical details of control-flow and data-flow obfuscation techniques based on the idea that no source code or other dependencies are required to apply strong obfuscation directly to the intermediate bitcode representation rather than the original source code or the native binaries. We conclude by providing insights into the usage of obfuscation in relation to the security requirements of connected and cloud software systems

By clicking the "Download Paper" button, you are agreeing to our terms and conditions.

Similar Papers

Dynamically Addressing the Gap of Software Application Protection without Hardware Security
By Rafie Shamsaasef & Aaron Anderson, CommScope
2019
Cloud-based Dynamic Executable Verification
By Rafie Shamsaasef, Aaron Anderson & Sasha Medvinsky, CommScope
2020
Key Learnings from Comcast’s Use of Open Source Software in the Access Network
By Louis Donofrio & Qin Zang, Comcast Cable; Vignesh Ramamurthy, Infosys Consulting
2020
A Supply Chain of Weak Links: Open Source Versus Proprietary Software Threat Analysis
By Brian A. Scriber, CableLabs
2023
Open Source, a Mindset and How it Has Transformed Common Platform Enumeration Stack Software Development using Reference Design Kit
By Khem Raj, Comcast
2022
Xml Schema Representing An EBIF Template Definition, Method For Auto-generating Schematic Instances From Original EBIF Source Code And Constraining Customized Instantiations Of The Resulting Template
By Mike McMahon and Lea Anne Dobbins, Comcast Media Center
2010
Diversity Via Code Transformations: A Solution For NGNA Renewable Security
By Yongxin Zhou, Alec Main, Cloakware Inc.
2006
2019 Virtualized CPE Services Have Finally Arrived Via Service Delivery Platforms
By Ian Wheelock & Charles Cheevers, CommScope
2019
Why Location is Now a Thing in Wi-Fi: Operational Considerations for Standard Power 6 GHz Wi-Fi
By Scott Voegele, CommScope
2023
Powering the Near Future 10G Access Network: Considerations for Assuring Sufficient and Reliable Power
By Rob Anderson, EnerSys Energy Systems
2020
More Results >>