Results 141 to 150 of about 27,012 (180)
Some of the next articles are maybe not open access.
Data obfuscation with network coding
Computer Communications, 2012Network coding techniques such as fountain codes are a promising way to disseminate large bulks of data in a multicast manner over an unreliable medium. In this work we investigate how to conceal such an encoded data stream on its way to numerous receivers with a minimum investment.
Hessler A. +3 more
openaire +1 more source
A code obfuscation framework using code clones
Proceedings of the 22nd International Conference on Program Comprehension, 2014IT industry loses tens of billions of dollars annually from security attacks such as malicious reverse engineering. To protect sensitive parts of software from such attacks, we designed a code obfuscation scheme based on nontrivial code clones. While implementing this scheme, we realized that currently there is no framework to assist implementation of ...
Aniket Kulkarni, Ravindra Metta
openaire +1 more source
2017 2nd International Conference on Communication Systems, Computing and IT Applications (CSCITA), 2017
Software Reverse Engineering scenario would involve software that has been worked upon for years and carries several modules of a business in its lines of code. Unfortunately the source code of the application has been lost, what remains is “native” or “binary” code. Traditional obfuscators work on binary code but they are tedious and do not provide us
Pratik Kanani +4 more
openaire +1 more source
Software Reverse Engineering scenario would involve software that has been worked upon for years and carries several modules of a business in its lines of code. Unfortunately the source code of the application has been lost, what remains is “native” or “binary” code. Traditional obfuscators work on binary code but they are tedious and do not provide us
Pratik Kanani +4 more
openaire +1 more source
Source Code Obfuscation for Smart Contracts
2020 27th Asia-Pacific Software Engineering Conference (APSEC), 2020State-of-the-art work of evaluating smart contract static analysis tools faces a major problem: most test cases (i.e., labeled buggy contracts) are too simple and lack complexity, which makes the evaluation unable to show the real performance of the analysis tools when complex contracts are analyzed.
Meng Zhang +3 more
openaire +1 more source
Obfuscation undercover: Unraveling the impact of obfuscation layering on structural code patterns
Malware often uses code obfuscation to evade detection, employing techniques such as packing, virtualization, and data encoding or encryption. Despite widespread application, the impact of combining these techniques in a particular order – so-called obfuscation layering – on code analysis remains poorly understood. This study advances previous research
Sebastian Schrittwieser
exaly +2 more sources
Semantic-Based Code Obfuscation by Abstract Interpretation
Journal of Computer Security, 2005In recent years code obfuscation has attracted research interest as a promising technique for protecting secret properties of programs. The basic idea of code obfuscation is to transform programs in order to hide their sensitive information while preserving their functionality.
DALLA PREDA, Mila, GIACOBAZZI, Roberto
openaire +2 more sources
Control code obfuscation by abstract interpretation
Third IEEE International Conference on Software Engineering and Formal Methods (SEFM'05), 2005Control code obfuscation is intended to prevent malicious reverse engineering of software by masking the program control flow. These obfuscating transformations often rely on the existence of opaque predicates, that support the design of transformations that break up the program control flow. We prove that an algorithm for control obfuscation by opaque
DALLA PREDA, Mila, GIACOBAZZI, Roberto
openaire +2 more sources
Protecting Java code via code obfuscation
XRDS: Crossroads, The ACM Magazine for Students, 1998The Java language is compiled into a platform independent bytecode format. Much of the information contained in the original source code remains in the bytecode, thus decompilation is easy. We will examine how code obfuscation can help protect Java bytecodes.
openaire +1 more source
A detection framework for semantic code clones and obfuscated code
Expert Systems with Applications, 2018Abstract Code obfuscation is a staple tool in malware creation where code fragments are altered substantially to make them appear different from the original, while keeping the semantics unaffected. A majority of the obfuscated code detection methods use program structure as a signature for detection of unknown codes.
Abdullah Sheneamer +2 more
openaire +1 more source
A novel algorithm for obfuscated code analysis
2011 IEEE International Workshop on Information Forensics and Security, 2011Obfuscated code is machine or source code that is made difficult to be read by humans. It is usually done to hide some important business logic or to hide malicious intent. There has been a dramatic increase in the use of obfuscated codes for drive-by-download web browser attacks using javascripts.
Breno Silva Pinto, Ryan Barnett
openaire +1 more source

