Results 231 to 240 of about 26,866 (284)

Hidden in plain sight: antisemitic content in QAnon subreddits. [PDF]

open access: yesPLoS One
Weinberg DB   +9 more
europepmc   +1 more source

Data Hiding Using Code Obfuscation

Proceedings of the 16th International Conference on Availability, Reliability and Security, 2021
Digital transformation of many companies and government administrations, now accelerated by the pandemic, provides cybercriminals an increased opportunity of incorporating various types of information hiding techniques into the malicious software and by that perform different types of attacks.
Pawel Rajba, Wojciech Mazurczyk
openaire   +1 more source

Obfuscation: Maze of code

2017 2nd International Conference on Communication Systems, Computing and IT Applications (CSCITA), 2017
Software Reverse Engineering scenario would involve software that has been worked upon for years and carries several modules of a business in its lines of code. Unfortunately the source code of the application has been lost, what remains is “native” or “binary” code. Traditional obfuscators work on binary code but they are tedious and do not provide us
Pratik Kanani   +4 more
openaire   +1 more source

Obfuscated Code Quality Measurement

2019 XXIX International Scientific Symposium "Metrology and Metrology Assurance" (MMA), 2019
Nowadays, number of cyber-attacks aimed at software increases. Thus, improving the quality of software security services becomes acute. Confidentiality is one of the basic security services. It is provided, including through the use of obfuscation mechanism. Code quality measurement Methods has been investigated. Particular attention is paid to methods
Serhii Semenov   +2 more
openaire   +1 more source

Home - About - Disclaimer - Privacy