J. Ge, S. Chaudhuri, A. Tyagi, "Control Flow Based Obfuscation", in Proceedings of the 5th ACM Workshop on Digital Rights Management (DRM '05), pp. 83-92, 2005. ABSTRACT A software obfuscator is a program O to transform a source program P for protection against malicious reverse engineering. O should be correct (O(P) has same functionality with P), resilient (O(P) is resilient against attacks), and e ective (O(P) is not too much slower than P). In this paper we describe the design of an obfuscator which consists of two parts. The rst part extracts the control ow information from the program and saves it in another process named Monitor-process. The second part protects Monitor-process converting it into an Aucsmith like self-modifying version. We prove the correctness of the obfuscation scheme. We assess its resilience and eciency to show that both are high. This supports the claim that our approach is practical. @inproceedings{1102561, author = {Jun Ge and Soma Chaudhuri and Akhilesh Tyagi}, title = {Control flow based obfuscation}, booktitle = {DRM '05: Proceedings of the 5th ACM workshop on Digital rights management}, year = {2005}, isbn = {1-59593-230-5}, pages = {83--92}, location = {Alexandria, VA, USA}, doi = {http://doi.acm.org/10.1145/1102546.1102561}, publisher = {ACM Press}, address = {New York, NY, USA}, }