Results 151 to 160 of about 27,012 (180)
Some of the next articles are maybe not open access.
Efficient Code Obfuscation for Android
2013Recent years have witnessed a steady shift in technology from desktop computers to mobile devices. In the global picture of available mobile platforms, Android stands out as a dominant participant on the market and its popularity continues rising. While beneficial for its users, this growth simultaneously creates a prolific environment for exploitation
openaire +1 more source
Obfuscated Code Quality Measurement
2019 XXIX International Scientific Symposium "Metrology and Metrology Assurance" (MMA), 2019Nowadays, number of cyber-attacks aimed at software increases. Thus, improving the quality of software security services becomes acute. Confidentiality is one of the basic security services. It is provided, including through the use of obfuscation mechanism. Code quality measurement Methods has been investigated. Particular attention is paid to methods
Serhii Semenov +2 more
openaire +1 more source
Modern Static Analysis of Obfuscated Code
Proceedings of the 3rd ACM Workshop on Software Protection, 2019Static analysis tools have improved significantly in recent years with advances in intermediate representations, symbolic execution, constraint solving, control flow recovery, and static data flow analysis. Scripting of static analysis has improved at an even faster pace, with new APIs allowing easy access to extend or modify the building blocks that ...
openaire +1 more source
Analysis on Technique for Code Obfuscation
Proceedings of the 2023 2nd International Conference on Networks, Communications and Information Technology, 2023Ni Zhang +4 more
openaire +1 more source
A First Look at Code Obfuscation for WebAssembly
Proceedings of the 15th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2022Shrenik Bhansali +4 more
openaire +1 more source
Quantitative measures for code obfuscation security
2016In this thesis we establish a quantitative framework to measure and study the security of code obfuscation, an effective software protection method that defends software against malicious reverse engineering. Despite the recent positive result by Garg et al.[GGH+13] that shows the possibility of obfuscating using indistinguishability obfuscation ...
openaire +3 more sources
Hardware-assisted code obfuscation
2014Software obfuscation is a longstanding and open research challenge in computer security. While theoretical results indicate that provably secure obfuscation in general is impossible to achieve, many application areas (e.g. malware, commercial software, etc.) show that software obfuscation is indeed employed in practice.
openaire +1 more source
On the robustness of clone detection to code obfuscation
2013 7th International Workshop on Software Clones (IWSC), 2013Sandro Schulze, Daniel Meyer
openaire +1 more source
Modeling Obfuscation Stealth Through Code Complexity
Code obfuscation is often utilized by authors of malware to protect it from detection or to hide its maliciousness from code analysis. Obfuscation stealth describes how difficult it is to determine which protection technique has been applied to a program and which parts of the code have been protected.Sebastian Schrittwieser +6 more
openaire +1 more source
Code-Based Conjunction Obfuscation
Chinese Journal of Electronics, 2023Zheng Zhang +2 more
openaire +1 more source

