Results 11 to 20 of about 27,012 (180)
On the evaluation of android malware detectors against code-obfuscation techniques [PDF]
The Android mobile platform is the most popular and dominates the cell phone market. With the increasing use of Android, malware developers have become active in circumventing security measures by using various obfuscation techniques.
Umair Nawaz +2 more
doaj +3 more sources
Assessment of Source Code Obfuscation Techniques [PDF]
Obfuscation techniques are a general category of software protections widely adopted to prevent malicious tampering of the code by making applications more difficult to understand and thus harder to modify.
Basile, Cataldo +6 more
core +4 more sources
Detection of Obfuscated Malicious JavaScript Code
Websites on the Internet are becoming increasingly vulnerable to malicious JavaScript code because of its strong impact and dramatic effect. Numerous recent cyberattacks use JavaScript vulnerabilities, and in some cases employ obfuscation to conceal ...
Ammar Alazab +3 more
doaj +2 more sources
Hybrid Obfuscation Technique to Protect Source Code From Prohibited Software Reverse Engineering
In this research, a new Hybrid Obfuscation Technique was proposed to prevent prohibited Reverse Engineering. The proposed hybrid technique contains three approaches; first approach is string encryption.
Asma'a Mahfoud Hezam Al-Hakimi +4 more
doaj +3 more sources
A Framework to Quantify the Quality of Source Code Obfuscation
Malicious reverse engineering of software has served as a valuable technique for attackers to infringe upon and steal intellectual property. We can employ obfuscation techniques to protect against such attackers as useful tools to safeguard software ...
Hongjoo Jin +4 more
doaj +3 more sources
Code Obfuscation: A Comprehensive Approach to Detection, Classification, and Ethical Challenges
Code obfuscation has become an essential practice in modern software development, designed to make source or machine code challenging for both humans and computers to comprehend.
Tomer Raitsis +5 more
doaj +3 more sources
Metrics for code obfuscation based on symbolic execution and N-scope complexity
Code obfuscation has been well developed as mitigated endogenous security technology, to effectively resist MATE attacks (e.g.reverse engineering).And it also has important value for the reasonable metrics of code obfuscation effect.Since symbolic ...
Yuqiang XIAO, Yunfei GUO, Yawen WANG
doaj +3 more sources
Early developments in code obfuscation were chiefly motivated by the needs of Digital Rights Management (DRM). Other suggested applications included intellectual property protection of software and code diversification to combat the monoculture problem of operating systems. Code obfuscation is typically employed in security scenarios where an adversary
Mahin Talukder, Syed Islam, Falcarin P
openaire +4 more sources
Optimizing RTL Code Obfuscation: New Methods Based on XML Syntax Tree
As the most widely used description code in digital circuits and system on chip (SoC), the security of register transfer level (RTL) code is extremely critical.
Hanwen Yi, Jin Zhang, Sheng Liu
doaj +1 more source
With the increasing complexity of software functions and the evolving technologies of network attacks, malicious behaviors such as software piracy, software cracking, data leakage, and malicious software modification are on the rise.As a result, software
Qingfeng WANG, Hao LIANG, Yawen WANG, Genlin XIE, Benwei HE
doaj +3 more sources

