<script type="text/javascript">
<!--
document.write('<div id="oa_widget"></div>');
document.write('<script type="text/javascript" src="https://www.openaire.eu/index.php?option=com_openaire&view=widget&format=raw&projectId=undefined&type=result"></script>');
-->
</script>
The paper describes methodologies added to the Gnu compiler collection GCC in an effort to create an obfuscating compiler. An obfuscating compiler creates programs which, when run, execute with the same results as un-obfuscated code, but which are more difficult to reverse engineer from the binary artefact. This provides increased protection with respect to the privacy of the intellectual property within the software, by thwarting the tools normally used to extract information from the binary executable. Reverse engineering technologies involving analysis of machine instructions are briefly described for background. The three methods of obfuscation implemented in the research are detailed: jump hiding, block shuffling, and junk insertion. Overhead in terms of space and speed are given using standard benchmark software.
citations This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically). | 2 | |
popularity This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network. | Average | |
influence This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically). | Average | |
impulse This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network. | Average |