Results 11 to 20 of about 217 (114)

SCORE: Source Code Optimization & REconstruction

open access: yesIEEE Access, 2020
The main goal of obfuscation is to make software difficult to analyze. Although obfuscation is one useful method to protect programs, the ability to analyze malware is greatly reduced if used for malicious purposes.
Jae Hyuk Suk   +2 more
doaj   +1 more source

Locating Third-party Library Functions in Obfuscated Applications [PDF]

open access: yesJisuanji kexue, 2023
Third-party libraries are an important part of Android applications.When enforcing security enhancement or analysis based on application repackaging,it is often necessary to locate specific functions in third-party library.To this end,there is a need to ...
YUAN Jiangfeng, LI Haoxiang, YOU Wei, HUANG Jianjun, SHI Wenchang, LIANG Bin
doaj   +1 more source

The rise of obfuscated Android malware and impacts on detection methods [PDF]

open access: yesPeerJ Computer Science, 2022
The various application markets are facing an exponential growth of Android malware. Every day, thousands of new Android malware applications emerge. Android malware hackers adopt reverse engineering and repackage benign applications with their malicious
Wael F. Elsersy   +2 more
doaj   +2 more sources

Symbolic Execution of Obfuscated Code [PDF]

open access: yesProceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015
Symbolic and concolic execution nd important applications in a number of security-related program analyses, including analysis of malicious code. However, malicious code tend to very often be obfuscated, and current concolic analysis techniques have trouble dealing with some of these obfuscations, leading to imprecision and/or excessive resource usage.
Babak Yadegari, Saumya Debray
openaire   +1 more source

Deoptfuscator: Defeating Advanced Control-Flow Obfuscation Using Android Runtime (ART)

open access: yesIEEE Access, 2022
Code obfuscation is a technique that makes it difficult for code analyzers to understand a program by transforming its structures or operations while maintaining its original functionality.
Geunha You   +4 more
doaj   +1 more source

Code Obfuscation [PDF]

open access: yesProceedings of the Eighth ACM Conference on Data and Application Security and Privacy, 2018
Early developments in code obfuscation were chiefly motivated by the needs of Digital Rights Management (DRM). Other suggested applications included intellectual property protection of software and code diversification to combat the monoculture problem of operating systems. Code obfuscation is typically employed in security scenarios where an adversary
openaire   +1 more source

APIASO: A Novel API Call Obfuscation Technique Based on Address Space Obscurity

open access: yesApplied Sciences, 2023
API calls are programming interfaces used by applications. When it is difficult for an analyst to perform a direct reverse analysis of a program, the API provides an important basis for analyzing the behavior and functionality of the program. API address
Yang Li   +5 more
doaj   +1 more source

Enhanced Metamorphic Techniques-A Case Study Against Havex Malware

open access: yesIEEE Access, 2021
Most of the commercial antiviruses are signature based, that is, they use existing database signature to detect the malware. Malware authors use code obfuscation techniques in their variety of malware with the aim of bypassing detection by antiviruses ...
Zainub Mumtaz   +4 more
doaj   +1 more source

Deobfuscation: Reverse Engineering Obfuscated Code [PDF]

open access: yes12th Working Conference on Reverse Engineering (WCRE'05), 2006
In recent years, code obfuscation has attracted attention as a low cost approach to improving software security by making it difficult for attackers to understand the inner workings of proprietary software systems. This paper examines techniques for automatic deobfuscation of obfuscated programs, as a step towards reverse engineering such programs. Our
S.K. Udupa, S.K. Debray, M. Madou
openaire   +1 more source

Common Program Similarity Metric Method for Anti-Obfuscation

open access: yesIEEE Access, 2018
Program similarity metrics, especially malware similarity metrics, have long been an area of active research. However, code obfuscation techniques bring many challenges to similarity analysis.
Xiaochuan Zhang   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy