Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Yuan Xiang Gu is active.

Publication


Featured researches published by Yuan Xiang Gu.


international conference on information security | 2001

An Approach to the Obfuscation of Control-Flow of Sequential Computer Programs

Stanley T. Chow; Yuan Xiang Gu; Harold J. Johnson; Vladimir A. Zakharov

In this paper we present a straightforward approach to the obfuscation of sequential program control-flow in order to design tamperresistant software. The principal idea of our technique is as follows: Let I be an instance of a hard combinatorial problem C, whose solution K is known. Then, given a source program ?, we implant I into ? by applying semantics-preserving transformations and using K as a key. This yields as its result an obfuscated program ?I,K, such that a detection of some property P of ?I,K, which is essential for comprehending the program, gives a solution to I. Varying instances I, we obtain a family ?C of obfuscated programs such that the problem of checking P for ?C is at least as hard as C. We show how this technique works by taking for C the acceptance problem for linear bounded Turing machines, which is known to be pspace-complete.


workshop on information security applications | 2007

Information hiding in software with mixed Boolean-arithmetic transforms

Yongxin Zhou; Alec Main; Yuan Xiang Gu; Harold Joseph Johnson

As increasingly powerful software analysis and attack tools arise, we need increasingly potent software protections. We generate an unlimited supply of obscuring transforms via mixed-mode computation over Boolean-arithmetic (mba) algebras corresponding to real-world functions and data. Such transforms resist reverse engineering with existing advanced tools and create NP-hard problems for the attacker. We discuss broad uses and concrete applications to aacs key hiding and software watermarking.


acm workshop on programming languages and analysis for security | 2008

A compiler-based infrastructure for software-protection

Clifford Liem; Yuan Xiang Gu; Harold Johnson

Not long after the introduction of stored-program computing machines, the first high-level language compilers appeared. The need for automatically and efficiently mapping abstract concepts from high-level languages onto low-level assembly languages has been recognized ever since. A compiler has a unique ability to gather and analyze large amounts of data in a manner that would be an unwieldy manual endeavor. It is this property that makes known compiler techniques and technology ideally suited for the purposes of software protection against reverse engineering and tampering attacks. In this paper, we present a code transformation infrastructure combined with build-time security techniques that are used to integrate protection into otherwise vulnerable machine programs. We show the applicability of known compiler techniques such as aliasanalysis, whole program analysis, data-flow analysis, and control-flow analysis and how these capabilities provide the basis for program transformations that provide comprehensive software protection. These methods are incorporated in an extensible framework allowing efficient development of new code transformations, as part of a larger suite of security tools for the creation of robust applications. We describe a number of successful applications of these tools.


Archive | 2008

System and method of interlocking to protect software - mediated program and device behaviors

Harold Joseph Johnson; Yuan Xiang Gu; Yongxin Zhou


Archive | 1996

Encoding technique for software and hardware

Harold J. Johnson; Yuan Xiang Gu; Becky Laiping Chang; Stanley T. Chow


Archive | 2004

Secure method and system for computer protection

Stanley T. Chow; Harold T. Johnson; Alexander Main; Yuan Xiang Gu


Archive | 1998

***WITHDRAWN PATENT AS PER THE LATEST USPTO WITHDRAWN LIST***Encoding technique for software and hardware

Harold J. Johnson; Yuan Xiang Gu; Becky Laiping Chan; Stanley T. Chow


Archive | 2012

UPDATING SOFTWARE COMPONENTS

Clifford Liem; Hongrui Dong; Sam Martin; Yuan Xiang Gu; Michael Weiner


Archive | 2011

System And Method Providing Dependency Networks Throughout Applications For Attack Resistance

Clifford Liem; Yongxin Zhou; Yuan Xiang Gu


Archive | 2013

Securing accessible systems using dynamic data mangling

Harold Johnson; Yuan Xiang Gu; Michael Wiener

Collaboration


Dive into the Yuan Xiang Gu's collaboration.

Researchain Logo
Decentralizing Knowledge