Show simple item record

dc.rights.licenseCC BY-NC-ND. Users may download and share copies with attribution in accordance with a Creative Commons Attribution-Noncommercial-No Derivative Works 3.0 License. No commercial use or derivatives are permitted without the explicit approval of the author.
dc.contributorYener, Bülent, 1959-
dc.contributorMilanova, Ana
dc.contributorSzymanśki, Bolesław
dc.contributor.authorBlackthorne, Jeremy Lee
dc.date.accessioned2021-11-03T08:24:39Z
dc.date.available2021-11-03T08:24:39Z
dc.date.created2015-06-09T13:36:54Z
dc.date.issued2015-05
dc.identifier.urihttps://hdl.handle.net/20.500.13015/1429
dc.descriptionMay 2015
dc.descriptionSchool of Science
dc.description.abstractIn this work, we initiate a theoretical study of obfuscation with regards to programs that interact with a user and an environment. We define the System-Interaction model to formally represent this additional dimension of interaction. We also define a semantically obfuscated program within our model as one that hides all semantic predicates from a computationally bounded adversary. This is possible while still remaining useful because semantically obfuscated programs can interact with an operating system while showing nothing to the user. Next, we analyze the necessary and sufficient conditions of achieving this standard of obfuscation. Finally, we demonstrate a candidate approach to achieving those conditions on current computers.
dc.description.abstractTheoretical investigations of obfuscation have been built around a model of a single Turing machine which interacts with a user. A drawback of this model is that it cannot account for the most common approach to obfuscation used by malware, the observer-effect. The observer-effect describes the situation in which the act of observing something changes it. Malware implements the observer-effect by detecting and acting on changes in its environment caused by user observation.
dc.language.isoENG
dc.publisherRensselaer Polytechnic Institute, Troy, NY
dc.relation.ispartofRensselaer Theses and Dissertations Online Collection
dc.rightsAttribution-NonCommercial-NoDerivs 3.0 United States*
dc.rights.urihttp://creativecommons.org/licenses/by-nc-nd/3.0/us/*
dc.subjectComputer science
dc.titleObfuscation through the observer-effect : thinking outside the virtual black-box
dc.typeElectronic thesis
dc.typeThesis
dc.digitool.pid175855
dc.digitool.pid175856
dc.digitool.pid175857
dc.rights.holderThis electronic version is a licensed copy owned by Rensselaer Polytechnic Institute, Troy, NY. Copyright of original work retained by author.
dc.description.degreeMS
dc.relation.departmentDept. of Computer Science


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record

CC BY-NC-ND. Users may download and share copies with attribution in accordance with a Creative Commons Attribution-Noncommercial-No Derivative Works 3.0 License. No commercial use or derivatives are permitted without the explicit approval of the author.
Except where otherwise noted, this item's license is described as CC BY-NC-ND. Users may download and share copies with attribution in accordance with a Creative Commons Attribution-Noncommercial-No Derivative Works 3.0 License. No commercial use or derivatives are permitted without the explicit approval of the author.