Results 201 to 210 of about 897,349 (250)
An artificial insurance framework for a hydrogen-based microgrid to detect the advanced cyberattack model. [PDF]
Fakhrooeian M +6 more
europepmc +1 more source
Investigating Country-Specific Perceptions of Predatory Journals and Their Impact on Scholarly Integrity: A Systematic Review. [PDF]
Martinino A +5 more
europepmc +1 more source
Revisiting European social dialogue: A systematic literature review. [PDF]
Cárdenas Domínguez F +2 more
europepmc +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
Code Obfuscation Based on Inline Split of Control Flow Graph
2021 IEEE International Conference on Artificial Intelligence and Computer Applications (ICAICA), 2021Control flow graph is an important concept in the field of program analysis, which represents the source program in the form of graph. On the control flow graph, we can easily analyze the predecessor and successor relationship among basic blocks.
Yang Li +3 more
semanticscholar +1 more source
Evaluation of Hardware Obfuscation Techniques using Obfuscation Tool oLLVM
IEEJ Transactions on Industry Applications, 2019Obfuscation is a method to conceal the structure and function of software. Obfuscator-LLVM (oLLVM) is a set of tools for software obfuscation, which is implemented as middle-end passes in an LLVM framework.
Yuumi Matsuoka +2 more
semanticscholar +1 more source
"Digital Camouflage": The LLVM Challenge in LLM-Based Malware Detection
Journal of Systems and SoftwareLarge Language Models (LLMs) have emerged as promising tools for malware detection by analyzing code semantics, identifying vulnerabilities, and adapting to evolving threats.
Ekin Böke, Simon Torka
semanticscholar +1 more source
arXiv.org
Large language models (LLMs) have shown promise in software engineering, yet their effectiveness for binary analysis remains unexplored. We present the first comprehensive evaluation of commercial LLMs for assembly code deobfuscation. Testing seven state-
Anton Tkachenko +2 more
semanticscholar +1 more source
Large language models (LLMs) have shown promise in software engineering, yet their effectiveness for binary analysis remains unexplored. We present the first comprehensive evaluation of commercial LLMs for assembly code deobfuscation. Testing seven state-
Anton Tkachenko +2 more
semanticscholar +1 more source
Code Obfuscated Compilation Method Based on Mimic Defense
2025 International Conference on Computer Science, Technology and Engineering (ICCSTE)Existing code obfuscation techniques introduce bogus control flow and string obfuscation to conceal program logic and hardcoded sensitive information but exhibit insufficient code semantic obfuscation and recognizable obfuscation patterns. To this end, a
Zhuo Wang +5 more
semanticscholar +1 more source
A Control Flow Integrity Checking Technique Based on Hardware Support
IEEE Advanced Information Technology, Electronic and Automation Control Conference, 2018In this paper, we propose a new hardware-supported lightweight control flow integrity check method in RISC architecture processors, which resists code reuse attacks with negligible performance overhead without extending ISAs or modifying compile. The key
Yang Li, Z. Dai, Junwei Li
semanticscholar +1 more source
Control Engineering Practice, 2019
Load frequency control (LFC) is a well-established issue in design and operation of power systems considering to the extension, restructuring, and complexity of the interconnected power systems and also the emergence utilization of renewable energy ...
S. M. Nosratabadi +2 more
semanticscholar +1 more source
Load frequency control (LFC) is a well-established issue in design and operation of power systems considering to the extension, restructuring, and complexity of the interconnected power systems and also the emergence utilization of renewable energy ...
S. M. Nosratabadi +2 more
semanticscholar +1 more source

