Results 131 to 140 of about 27,012 (180)

HabitSense: A Privacy-Aware, AI-Enhanced Multimodal Wearable Platform for mHealth Applications. [PDF]

open access: yesProc ACM Interact Mob Wearable Ubiquitous Technol
Fernandes GJ   +11 more
europepmc   +1 more source

Code obfuscation techniques for metamorphic viruses

Journal in Computer Virology, 2008
This paper deals with metamorphic viruses. More precisely, it examines the use of advanced code obfuscation techniques with respect to metamorphic viruses. Our objective is to evaluate the difficulty of a reliable static detection of viruses that use such obfuscation techniques. Here we extend Spinellis’ result (IEEE Trans. Inform.
Ludovic MĂ©
exaly   +3 more sources

A taxonomy of self-modifying code for obfuscation

Computers and Security, 2011
Self-modifying code is frequently used as an additional layer of complexity when obfuscating code. Although it does not provide a provable level of obfuscation, it is generally assumed to make attacks more expensive. This paper attempts to quantify the cost of attacking self-modified code by defining a taxonomy for it and systematically categorising an
Bart Preneel
exaly   +2 more sources

Data Hiding Using Code Obfuscation

Proceedings of the 16th International Conference on Availability, Reliability and Security, 2021
Digital transformation of many companies and government administrations, now accelerated by the pandemic, provides cybercriminals an increased opportunity of incorporating various types of information hiding techniques into the malicious software and by that perform different types of attacks.
Pawel Rajba, Wojciech Mazurczyk
openaire   +1 more source

Home - About - Disclaimer - Privacy