A note on the concept of obfuscation.
In this paper we address the issue of defining security of program obfuscation. We argue that requirements to obfuscated programs may be different and are dependent on potential applications. Therefore three distinct models are suggested for studying the issues of obfuscation, namely obfuscation for software protection, total obfuscation and constant hiding. We also introduce a definition of weak obfuscation based on “grey-box” paradigm and show this weak form of obfuscation to be impossible.
Труды Института системного программирования РАН, том 6, 2004, стр. 127-136.
ISSN 2220-6426 (Online), ISSN 2079-8156 (Print).