3 research outputs found

    Weakening Additivity in Adjoining Closures

    Get PDF
    In this paper, we weaken the conditions for the existence of adjoint closure operators, going beyond the standard requirement of additivity/co-additivity. We consider the notion of join-uniform (lower) closure operators, introduced in computer science, in order to model perfect lossless compression in transformations acting on complete lattices. Starting from Janowitz\u2019s characterization of residuated closure operators, we show that join-uniformity perfectly weakens additivity in the construction of adjoint closures, and this is indeed the weakest property for this to hold. We conclude by characterizing the set of all join-uniform lower closure operators as fix-points of a function defined on the set of all lower closures of a complete lattice

    Characterizing A Property-Driven Obfuscation Strategy

    Get PDF
    n recent years, code obfuscation has attracted both researchers and software developers as a useful technique for protecting secret properties of proprietary programs. The idea of code obfuscation is to modify a program, while preserving its functionality, in order to make it more difficult to analyze. Thus, the aim of code obfuscation is to conceal certain properties to an attacker, while revealing its intended behavior. However, a general methodology for deriving an obfuscating transforma- tion from the properties to conceal and reveal is still missing. In this work, we start to address this problem by studying the existence and the characterization of function transformers that minimally or maximally modify a program in order to reveal or conceal a certain property. Based on this general formal framework, we are able to provide a characterization of the maximal obfuscating strategy for transformations concealing a given property while revealing the desired observational behavior. To conclude, we discuss the applicability of the proposed characterization by showing how some common obfuscation techniques can be interpreted in this framework. Moreover, we show how this approach allows us to deeply understand what are the behavioral properties that these transformations conceal, and therefore protect, and which are the ones that they reveal, and therefore disclose
    corecore