Results 161 to 170 of about 27,012 (180)
Some of the next articles are maybe not open access.

Program Code Protecting Mechanism Based on Obfuscation Tools

Studies in Computational Intelligence, 2022
Vadym Ye Mukhin   +2 more
exaly  

On Entropy Measures for Code Obfuscation

2012
The purpose of this paper is to introduce a further measurement for software obfuscation, in particular observing that many important obfuscation transformations increase the uncertainty an attacker has about the program behaviour, uncertainty modeled by the entropy of the program traces or the nodes under execution.
GIACOBAZZI, Roberto, TOPPAN, Andrea
openaire   +1 more source

Different Obfuscation Techniques for Code Protection

Procedia Computer Science, 2015
Chandan Kumar Behera, D Lalitha Bhaskari
exaly  

Enhance virtual-machine-based code obfuscation security through dynamic bytecode scheduling

Computers and Security, 2018
Zhanyong Tang, Xiaoqing Gong, Zheng Wang
exaly  

Analyzing Android Code Graphs against Code Obfuscation and App Hiding Techniques

Journal of Applied Security Research, 2019
Shikha Badhani
exaly  

A family of experiments to assess the effectiveness and efficiency of source code obfuscation techniques

Empirical Software Engineering, 2013
Mariano Ceccato   +2 more
exaly  

Evaluation of Code Obfuscating Transformation

Journal of Software, 2012
Yu-Jie ZHAO   +4 more
openaire   +1 more source

Evaluating model checking for cyber threats code obfuscation identification

Journal of Parallel and Distributed Computing, 2018
Francesco Mercaldo   +2 more
exaly  

Code Obfuscation by Using Floating Points and Conditional Statements

Advances in Intelligent Systems and Computing, 2016
Chandan Kumar Behera
exaly  

Home - About - Disclaimer - Privacy