Results 161 to 170 of about 27,012 (180)
Some of the next articles are maybe not open access.
Program Code Protecting Mechanism Based on Obfuscation Tools
Studies in Computational Intelligence, 2022Vadym Ye Mukhin +2 more
exaly
On Entropy Measures for Code Obfuscation
2012The purpose of this paper is to introduce a further measurement for software obfuscation, in particular observing that many important obfuscation transformations increase the uncertainty an attacker has about the program behaviour, uncertainty modeled by the entropy of the program traces or the nodes under execution.
GIACOBAZZI, Roberto, TOPPAN, Andrea
openaire +1 more source
Different Obfuscation Techniques for Code Protection
Procedia Computer Science, 2015Chandan Kumar Behera, D Lalitha Bhaskari
exaly
Enhance virtual-machine-based code obfuscation security through dynamic bytecode scheduling
Computers and Security, 2018Zhanyong Tang, Xiaoqing Gong, Zheng Wang
exaly
Analyzing Android Code Graphs against Code Obfuscation and App Hiding Techniques
Journal of Applied Security Research, 2019Shikha Badhani
exaly
Evaluation of Code Obfuscating Transformation
Journal of Software, 2012Yu-Jie ZHAO +4 more
openaire +1 more source
Evaluating model checking for cyber threats code obfuscation identification
Journal of Parallel and Distributed Computing, 2018Francesco Mercaldo +2 more
exaly
Code Obfuscation by Using Floating Points and Conditional Statements
Advances in Intelligent Systems and Computing, 2016Chandan Kumar Behera
exaly

