Results 151 to 160 of about 27,012 (180)
Some of the next articles are maybe not open access.

Efficient Code Obfuscation for Android

2013
Recent years have witnessed a steady shift in technology from desktop computers to mobile devices. In the global picture of available mobile platforms, Android stands out as a dominant participant on the market and its popularity continues rising. While beneficial for its users, this growth simultaneously creates a prolific environment for exploitation
openaire   +1 more source

Obfuscated Code Quality Measurement

2019 XXIX International Scientific Symposium "Metrology and Metrology Assurance" (MMA), 2019
Nowadays, number of cyber-attacks aimed at software increases. Thus, improving the quality of software security services becomes acute. Confidentiality is one of the basic security services. It is provided, including through the use of obfuscation mechanism. Code quality measurement Methods has been investigated. Particular attention is paid to methods
Serhii Semenov   +2 more
openaire   +1 more source

Modern Static Analysis of Obfuscated Code

Proceedings of the 3rd ACM Workshop on Software Protection, 2019
Static analysis tools have improved significantly in recent years with advances in intermediate representations, symbolic execution, constraint solving, control flow recovery, and static data flow analysis. Scripting of static analysis has improved at an even faster pace, with new APIs allowing easy access to extend or modify the building blocks that ...
openaire   +1 more source

Analysis on Technique for Code Obfuscation

Proceedings of the 2023 2nd International Conference on Networks, Communications and Information Technology, 2023
Ni Zhang   +4 more
openaire   +1 more source

A First Look at Code Obfuscation for WebAssembly

Proceedings of the 15th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2022
Shrenik Bhansali   +4 more
openaire   +1 more source

Quantitative measures for code obfuscation security

2016
In this thesis we establish a quantitative framework to measure and study the security of code obfuscation, an effective software protection method that defends software against malicious reverse engineering. Despite the recent positive result by Garg et al.[GGH+13] that shows the possibility of obfuscating using indistinguishability obfuscation ...
openaire   +3 more sources

Hardware-assisted code obfuscation

2014
Software obfuscation is a longstanding and open research challenge in computer security. While theoretical results indicate that provably secure obfuscation in general is impossible to achieve, many application areas (e.g. malware, commercial software, etc.) show that software obfuscation is indeed employed in practice.
openaire   +1 more source

On the robustness of clone detection to code obfuscation

2013 7th International Workshop on Software Clones (IWSC), 2013
Sandro Schulze, Daniel Meyer
openaire   +1 more source

Modeling Obfuscation Stealth Through Code Complexity

Code obfuscation is often utilized by authors of malware to protect it from detection or to hide its maliciousness from code analysis. Obfuscation stealth describes how difficult it is to determine which protection technique has been applied to a program and which parts of the code have been protected.
Sebastian Schrittwieser   +6 more
openaire   +1 more source

Code-Based Conjunction Obfuscation

Chinese Journal of Electronics, 2023
Zheng Zhang   +2 more
openaire   +1 more source

Home - About - Disclaimer - Privacy