Results 1 to 10 of about 26,866 (284)

On the evaluation of android malware detectors against code-obfuscation techniques [PDF]

open access: yesPeerJ Computer Science, 2022
The Android mobile platform is the most popular and dominates the cell phone market. With the increasing use of Android, malware developers have become active in circumventing security measures by using various obfuscation techniques.
Umair Nawaz   +2 more
doaj   +3 more sources

Assessment of Source Code Obfuscation Techniques [PDF]

open access: yes2016 IEEE 16th International Working Conference on Source Code Analysis and Manipulation (SCAM), 2016
Obfuscation techniques are a general category of software protections widely adopted to prevent malicious tampering of the code by making applications more difficult to understand and thus harder to modify.
Basile, Cataldo   +6 more
core   +4 more sources

Detection of Obfuscated Malicious JavaScript Code

open access: yesFuture Internet, 2022
Websites on the Internet are becoming increasingly vulnerable to malicious JavaScript code because of its strong impact and dramatic effect. Numerous recent cyberattacks use JavaScript vulnerabilities, and in some cases employ obfuscation to conceal ...
Ammar Alazab   +3 more
doaj   +2 more sources

Identifying obfuscated code through graph-based semantic analysis of binary code

open access: yesApplied Network Science
Protecting sensitive program content is a critical concern in various situations, ranging from legitimate use cases to unethical contexts. Obfuscation is one of the most used techniques to ensure such a protection.
Roxane Cohen   +3 more
doaj   +3 more sources

Metrics for code obfuscation based on symbolic execution and N-scope complexity

open access: yes网络与信息安全学报, 2022
Code obfuscation has been well developed as mitigated endogenous security technology, to effectively resist MATE attacks (e.g.reverse engineering).And it also has important value for the reasonable metrics of code obfuscation effect.Since symbolic ...
Yuqiang XIAO, Yunfei GUO, Yawen WANG
doaj   +3 more sources

Optimizing RTL Code Obfuscation: New Methods Based on XML Syntax Tree

open access: yesApplied Sciences, 2023
As the most widely used description code in digital circuits and system on chip (SoC), the security of register transfer level (RTL) code is extremely critical.
Hanwen Yi, Jin Zhang, Sheng Liu
doaj   +1 more source

Constructing method of opaque predicate based on type conversion and operation of floating point numbers

open access: yes网络与信息安全学报, 2023
With the increasing complexity of software functions and the evolving technologies of network attacks, malicious behaviors such as software piracy, software cracking, data leakage, and malicious software modification are on the rise.As a result, software
Qingfeng WANG, Hao LIANG, Yawen WANG, Genlin XIE, Benwei HE
doaj   +3 more sources

Understanding Obfuscated Code [PDF]

open access: yes14th IEEE International Conference on Program Comprehension (ICPC'06), 2006
Code obfuscation makes it harder for a security analyst to understand the malicious payload of a program. In most cases an analyst needs to study the program at the machine code level, with little or no extra information available, apart from his experience.
Madou, Matias   +2 more
openaire   +2 more sources

Review of path branch obfuscation

open access: yes网络与信息安全学报, 2020
Code obfuscation is a convenient and effective technique of software protection,which can combat MATE attacks based on reverse engineering.With the development of automatic programming analysis technology,a new code obfuscation technique which named path
Pu GENG, Yuefei ZHU
doaj   +3 more sources

Research on construction of conditional exception code used in branch obfuscation

open access: yes网络与信息安全学报, 2020
Using conditional exception code construction and exception handler to replace conditional jump code,the branch obfuscation get the right branch selection,but the address of branch point was concealed,so this obfuscation method can defeat symbolic ...
Pu GENG, Yuefei ZHU
doaj   +3 more sources

Home - About - Disclaimer - Privacy