Results 11 to 20 of about 27,012 (180)

On the evaluation of android malware detectors against code-obfuscation techniques [PDF]

open access: yesPeerJ Computer Science, 2022
The Android mobile platform is the most popular and dominates the cell phone market. With the increasing use of Android, malware developers have become active in circumventing security measures by using various obfuscation techniques.
Umair Nawaz   +2 more
doaj   +3 more sources

Assessment of Source Code Obfuscation Techniques [PDF]

open access: yes2016 IEEE 16th International Working Conference on Source Code Analysis and Manipulation (SCAM), 2016
Obfuscation techniques are a general category of software protections widely adopted to prevent malicious tampering of the code by making applications more difficult to understand and thus harder to modify.
Basile, Cataldo   +6 more
core   +4 more sources

Detection of Obfuscated Malicious JavaScript Code

open access: yesFuture Internet, 2022
Websites on the Internet are becoming increasingly vulnerable to malicious JavaScript code because of its strong impact and dramatic effect. Numerous recent cyberattacks use JavaScript vulnerabilities, and in some cases employ obfuscation to conceal ...
Ammar Alazab   +3 more
doaj   +2 more sources

Hybrid Obfuscation Technique to Protect Source Code From Prohibited Software Reverse Engineering

open access: yesIEEE Access, 2020
In this research, a new Hybrid Obfuscation Technique was proposed to prevent prohibited Reverse Engineering. The proposed hybrid technique contains three approaches; first approach is string encryption.
Asma'a Mahfoud Hezam Al-Hakimi   +4 more
doaj   +3 more sources

A Framework to Quantify the Quality of Source Code Obfuscation

open access: yesApplied Sciences
Malicious reverse engineering of software has served as a valuable technique for attackers to infringe upon and steal intellectual property. We can employ obfuscation techniques to protect against such attackers as useful tools to safeguard software ...
Hongjoo Jin   +4 more
doaj   +3 more sources

Code Obfuscation: A Comprehensive Approach to Detection, Classification, and Ethical Challenges

open access: yesAlgorithms
Code obfuscation has become an essential practice in modern software development, designed to make source or machine code challenging for both humans and computers to comprehend.
Tomer Raitsis   +5 more
doaj   +3 more sources

Metrics for code obfuscation based on symbolic execution and N-scope complexity

open access: yes网络与信息安全学报, 2022
Code obfuscation has been well developed as mitigated endogenous security technology, to effectively resist MATE attacks (e.g.reverse engineering).And it also has important value for the reasonable metrics of code obfuscation effect.Since symbolic ...
Yuqiang XIAO, Yunfei GUO, Yawen WANG
doaj   +3 more sources

Code Obfuscation [PDF]

open access: yesProceedings of the Eighth ACM Conference on Data and Application Security and Privacy, 2018
Early developments in code obfuscation were chiefly motivated by the needs of Digital Rights Management (DRM). Other suggested applications included intellectual property protection of software and code diversification to combat the monoculture problem of operating systems. Code obfuscation is typically employed in security scenarios where an adversary
Mahin Talukder, Syed Islam, Falcarin P
openaire   +4 more sources

Optimizing RTL Code Obfuscation: New Methods Based on XML Syntax Tree

open access: yesApplied Sciences, 2023
As the most widely used description code in digital circuits and system on chip (SoC), the security of register transfer level (RTL) code is extremely critical.
Hanwen Yi, Jin Zhang, Sheng Liu
doaj   +1 more source

Constructing method of opaque predicate based on type conversion and operation of floating point numbers

open access: yes网络与信息安全学报, 2023
With the increasing complexity of software functions and the evolving technologies of network attacks, malicious behaviors such as software piracy, software cracking, data leakage, and malicious software modification are on the rise.As a result, software
Qingfeng WANG, Hao LIANG, Yawen WANG, Genlin XIE, Benwei HE
doaj   +3 more sources

Home - About - Disclaimer - Privacy