In this work, we present the first implementation of such an obfuscator. We describe several challenges and optimizations we made along the way, present a detailed evaluation of our implementation, and discuss research problems that need to be addressed before such obfuscators can be used in practice.
Category / Keywords: implementation / obfuscation Date: received 1 Oct 2014, last revised 10 Feb 2015 Contact author: amaloz at cs umd edu Available format(s): PDF | BibTeX Citation Note: See changelog at end of paper for information on changed content. Version: 20150210:203741 (All versions of this report) Short URL: ia.cr/2014/779 Discussion forum: Show discussion | Start new discussion