Results 141 to 150 of about 27,012 (180)
Some of the next articles are maybe not open access.

Data obfuscation with network coding

Computer Communications, 2012
Network coding techniques such as fountain codes are a promising way to disseminate large bulks of data in a multicast manner over an unreliable medium. In this work we investigate how to conceal such an encoded data stream on its way to numerous receivers with a minimum investment.
Hessler A.   +3 more
openaire   +1 more source

A code obfuscation framework using code clones

Proceedings of the 22nd International Conference on Program Comprehension, 2014
IT industry loses tens of billions of dollars annually from security attacks such as malicious reverse engineering. To protect sensitive parts of software from such attacks, we designed a code obfuscation scheme based on nontrivial code clones. While implementing this scheme, we realized that currently there is no framework to assist implementation of ...
Aniket Kulkarni, Ravindra Metta
openaire   +1 more source

Obfuscation: Maze of code

2017 2nd International Conference on Communication Systems, Computing and IT Applications (CSCITA), 2017
Software Reverse Engineering scenario would involve software that has been worked upon for years and carries several modules of a business in its lines of code. Unfortunately the source code of the application has been lost, what remains is “native” or “binary” code. Traditional obfuscators work on binary code but they are tedious and do not provide us
Pratik Kanani   +4 more
openaire   +1 more source

Source Code Obfuscation for Smart Contracts

2020 27th Asia-Pacific Software Engineering Conference (APSEC), 2020
State-of-the-art work of evaluating smart contract static analysis tools faces a major problem: most test cases (i.e., labeled buggy contracts) are too simple and lack complexity, which makes the evaluation unable to show the real performance of the analysis tools when complex contracts are analyzed.
Meng Zhang   +3 more
openaire   +1 more source

Obfuscation undercover: Unraveling the impact of obfuscation layering on structural code patterns

open access: yesJournal of Information Security and Applications
Malware often uses code obfuscation to evade detection, employing techniques such as packing, virtualization, and data encoding or encryption. Despite widespread application, the impact of combining these techniques in a particular order – so-called obfuscation layering – on code analysis remains poorly understood. This study advances previous research
Sebastian Schrittwieser
exaly   +2 more sources

Semantic-Based Code Obfuscation by Abstract Interpretation

Journal of Computer Security, 2005
In recent years code obfuscation has attracted research interest as a promising technique for protecting secret properties of programs. The basic idea of code obfuscation is to transform programs in order to hide their sensitive information while preserving their functionality.
DALLA PREDA, Mila, GIACOBAZZI, Roberto
openaire   +2 more sources

Control code obfuscation by abstract interpretation

Third IEEE International Conference on Software Engineering and Formal Methods (SEFM'05), 2005
Control code obfuscation is intended to prevent malicious reverse engineering of software by masking the program control flow. These obfuscating transformations often rely on the existence of opaque predicates, that support the design of transformations that break up the program control flow. We prove that an algorithm for control obfuscation by opaque
DALLA PREDA, Mila, GIACOBAZZI, Roberto
openaire   +2 more sources

Protecting Java code via code obfuscation

XRDS: Crossroads, The ACM Magazine for Students, 1998
The Java language is compiled into a platform independent bytecode format. Much of the information contained in the original source code remains in the bytecode, thus decompilation is easy. We will examine how code obfuscation can help protect Java bytecodes.
openaire   +1 more source

A detection framework for semantic code clones and obfuscated code

Expert Systems with Applications, 2018
Abstract Code obfuscation is a staple tool in malware creation where code fragments are altered substantially to make them appear different from the original, while keeping the semantics unaffected. A majority of the obfuscated code detection methods use program structure as a signature for detection of unknown codes.
Abdullah Sheneamer   +2 more
openaire   +1 more source

A novel algorithm for obfuscated code analysis

2011 IEEE International Workshop on Information Forensics and Security, 2011
Obfuscated code is machine or source code that is made difficult to be read by humans. It is usually done to hide some important business logic or to hide malicious intent. There has been a dramatic increase in the use of obfuscated codes for drive-by-download web browser attacks using javascripts.
Breno Silva Pinto, Ryan Barnett
openaire   +1 more source

Home - About - Disclaimer - Privacy