PPT-Android Obfuscation
Author : mitsue-stanley | Published Date : 2016-08-31
Wangjun Hong Zhengyang Qu Northwestern University IL US 1 Outline Introduction Reverse Engineering Techniques Design amp Implementation Results Comparison 2
Presentation Embed Code
Download Presentation
Download Presentation The PPT/PDF document "Android Obfuscation" is the property of its rightful owner. Permission is granted to download and print the materials on this website for personal, non-commercial use only, and to display it on your personal computer provided you do not modify the materials and that you retain all copyright notices contained in the materials. By downloading content from our website, you accept the terms of this agreement.
Android Obfuscation: Transcript
Wangjun Hong Zhengyang Qu Northwestern University IL US 1 Outline Introduction Reverse Engineering Techniques Design amp Implementation Results Comparison 2 Android App compilation. Grey-Box . Obfuscation for General Circuits. Nir. . Bitansky. . Ran Canetti. Yael . Tauman-Kalai. . Omer . Paneth. Program Obfuscation. Obfuscated program. . . Obfuscation. Program. . . Private Key to Public Key. Implausibility of. . Differing-Inputs Obfuscation . (. and . Extractable Witness . Encryption) . with . Auxiliary Input. Daniel . Wichs. . (Northeastern U). with: . Sanjam. . Garg. , Craig Gentry, . and Hardenin. g . tool . for . Android Apps. Instrumenting . Android apps for runtime/dynamic . analysis.. Raman Goyal. B.Tech - IT (Undergraduate). IIIT Allahabad, India. Contents. Emulator Detection. 3-Round . Zero-Knowledge. Nir Bitansky and Omer Paneth. Interactive Proofs. An interactive proof . :. . . . . Interactive Proofs. Negligible. soundness error. . . . Prover’s security . SPAR Final PI Meeting, Annapolis MD. Craig Gentry and . Shai. . Halevi. June 17, 2014. The Future of Encrypted Computation. Encrypted Computation: . Where are we now?. Homomorphic. Encryption. Noisy somewhat HE, and bootstrapping. Shai Halevi. Obfuscation. China Summer School on Lattices and Cryptography, June 2014. Code Obfuscation. Encrypting programs, maintaining functionality. Only the functionality should be “visible” in the output. Program . Obfuscation. Omer Singer. June 8, 2009. Practical Background. What is program obfuscation?. Obfuscation is deliberately making software code so confusing that even those with access to the code can’t figure out what a program is going to do.. for Cryptographic. . Agents. Shashank Agrawal, . Manoj. . Prabhakaran. , . Ching-Hua Yu. Security Guarantee in Cryptography. A cryptographic scheme can provide certain security properties. Modern cryptography have involved properties. for Cryptographic. . Agents. Shashank Agrawal, . Manoj. . Prabhakaran. , . Ching-Hua Yu. Security Guarantee in Cryptography. A cryptographic scheme can provide certain security properties. Modern cryptography have involved properties. Nir. . Bitansky. and Omer . Paneth. Program Obfuscation. Compute . . . . Program Obfuscation. . . Program Obfuscation. Sign email . with . If . starts with “omer@bu.edu”. . . . Mohammad . Mahmoody (University of Virginia). Ameer Mohammed (University of Virginia). Soheil. . Nematihaji. (University of Virginia). a. bhi. . shelat. (University of Virginia). Rafael Pass (Cornell University). Haitao. Zhang, Alex . Afanasyev. , . Lixia. Zhang (UCLA). NDNComm. 2017. March 23-26, 2017. 1. Motivation. Android devices are . widely used. Android . accounts. . for. . 88. % market . share of . , . Alon. Rosen. On the cryptographic hardness. of finding a . nash. equilibrium. The Story Line. Games. Complexity. Crypto. Game Theory and Nash . Equilibrium. Cooperate . Defect. Cooperate . 2. \ . Hong, . Zhengyang. . Qu. ,. Northwestern University, IL, US, . 1. Outline. Introduction. Reverse Engineering Techniques. Design & Implementation. Results. Comparison. 2. Android App compilation.
Download Document
Here is the link to download the presentation.
"Android Obfuscation"The content belongs to its owner. You may download and print it for personal use, without modification, and keep all copyright notices. By downloading, you agree to these terms.
Related Documents