virtualization obfuscation - headings
DESCRIPTION
chapters for virtualization obfuscation thesisTRANSCRIPT
![Page 1: virtualization obfuscation - headings](https://reader035.vdocument.in/reader035/viewer/2022071718/56d6c0891a28ab30169aca6d/html5/thumbnails/1.jpg)
1. Introduction
1.1 - motivation - the problem - see proposal1.2 - contribution - goal - see proposal1.3 - thesis structure
2. Background2.1. Software protection
2.1.1 - different types of software protectiontaxonomia lui Collberg in Background chaptertalk about Legal, Remote Services, Encryption, Machine / Native
code, Obfuscation2.1.2 - obfuscation in generaldifferent obfuscation techniques2.1.3 - Virtualization obfuscation
- concept- usage
2.2. Software attacks
2.2.1 Static analysissummary of papers + - papers and tools- attacking VO
2.2.2 Dynamic analysissummary of papers + - papers and tools- attacking VO
2.2.3 State of the Art tools- obfuscators Agile.Net, Eazfuscator ...- deobfuscators / decompilers- opensource ConfuserEx
3. Design and Implementation
3.1 Virtualization Level2pg
3.1. Virtualization Algorithm- Refactoring- Virtualization- use cases, examples
2 pg
3.2. Obfuscator Archictecture
4.2 Types of Refactorings2 pg
4.3 Types of Interpreters- class, instance, method2pg
3.3. Obfuscator Settings- levels of randomness, frequency analysis mitigation3pg
3.4. Obfuscator Limitations- Implementation: lambda expressions- Challenges- Security (data structure visible)
2 pg
4. Evaluation
![Page 2: virtualization obfuscation - headings](https://reader035.vdocument.in/reader035/viewer/2022071718/56d6c0891a28ab30169aca6d/html5/thumbnails/2.jpg)
4.1 Collberg's taxonomyPotency, Resilience, Cost, Stealthtaxonomia lui Collberg in Background chapterEvaluation framework
4.2 Manual Static Analysis- inspect bytecode
4.3 Dynamic Automatic Analysis- levenstein distance
5.3 Cost: How much time/space overhead is added?- performance
runtime overhead
5. Conclusions
6. Future work - attacks