Results 11 to 20 of about 26,866 (284)
Control Flow Obfuscation Algorithm Based on Nesting Complexity [PDF]
The garbage code control flow obfuscation algorithm based on random insertion strategy has uncertain obfuscation potency and extra overhead.To solve the problem,a control flow Obfuscation algorithm based on Nesting Complexity(OB_NC) is proposed.The ...
WANG Lei,HOU Zhengfeng,XIANG Runzhao,SHI Zhaopeng
doaj +1 more source
The main goal of obfuscation is to make software difficult to analyze. Although obfuscation is one useful method to protect programs, the ability to analyze malware is greatly reduced if used for malicious purposes.
Jae Hyuk Suk +2 more
doaj +1 more source
Locating Third-party Library Functions in Obfuscated Applications [PDF]
Third-party libraries are an important part of Android applications.When enforcing security enhancement or analysis based on application repackaging,it is often necessary to locate specific functions in third-party library.To this end,there is a need to ...
YUAN Jiangfeng, LI Haoxiang, YOU Wei, HUANG Jianjun, SHI Wenchang, LIANG Bin
doaj +1 more source
InfoScrub: Towards Attribute Privacy by Targeted Obfuscation [PDF]
Personal photos of individuals when shared online, apart from exhibiting a myriad of memorable details, also reveals a wide range of private information and potentially entails privacy risks (e.g., online harassment, tracking). To mitigate such risks, it
Fritz, Mario +2 more
core +2 more sources
The rise of obfuscated Android malware and impacts on detection methods [PDF]
The various application markets are facing an exponential growth of Android malware. Every day, thousands of new Android malware applications emerge. Android malware hackers adopt reverse engineering and repackage benign applications with their malicious
Wael F. Elsersy +2 more
doaj +2 more sources
Deoptfuscator: Defeating Advanced Control-Flow Obfuscation Using Android Runtime (ART)
Code obfuscation is a technique that makes it difficult for code analyzers to understand a program by transforming its structures or operations while maintaining its original functionality.
Geunha You +4 more
doaj +1 more source
Symbolic Execution of Obfuscated Code [PDF]
Symbolic and concolic execution nd important applications in a number of security-related program analyses, including analysis of malicious code. However, malicious code tend to very often be obfuscated, and current concolic analysis techniques have trouble dealing with some of these obfuscations, leading to imprecision and/or excessive resource usage.
Babak Yadegari, Saumya Debray
openaire +1 more source
Understanding Android Obfuscation Techniques: A Large-Scale Investigation in the Wild [PDF]
In this paper, we seek to better understand Android obfuscation and depict a holistic view of the usage of obfuscation through a large-scale investigation in the wild.
Chen, Kai +9 more
core +2 more sources
APIASO: A Novel API Call Obfuscation Technique Based on Address Space Obscurity
API calls are programming interfaces used by applications. When it is difficult for an analyst to perform a direct reverse analysis of a program, the API provides an important basis for analyzing the behavior and functionality of the program. API address
Yang Li +5 more
doaj +1 more source
Early developments in code obfuscation were chiefly motivated by the needs of Digital Rights Management (DRM). Other suggested applications included intellectual property protection of software and code diversification to combat the monoculture problem of operating systems. Code obfuscation is typically employed in security scenarios where an adversary
openaire +1 more source

