Results 241 to 250 of about 26,866 (284)
Some of the next articles are maybe not open access.
Code obfuscation techniques for metamorphic viruses
Journal in Computer Virology, 2008This paper deals with metamorphic viruses. More precisely, it examines the use of advanced code obfuscation techniques with respect to metamorphic viruses. Our objective is to evaluate the difficulty of a reliable static detection of viruses that use such obfuscation techniques. Here we extend Spinellis’ result (IEEE Trans. Inform.
Borello, J.-M., MĂ©, Ludovic
openaire +2 more sources
Semantic-Based Code Obfuscation by Abstract Interpretation
Journal of Computer Security, 2005In recent years code obfuscation has attracted research interest as a promising technique for protecting secret properties of programs. The basic idea of code obfuscation is to transform programs in order to hide their sensitive information while preserving their functionality.
DALLA PREDA, Mila, GIACOBAZZI, Roberto
openaire +2 more sources
A code obfuscation framework using code clones
Proceedings of the 22nd International Conference on Program Comprehension, 2014IT industry loses tens of billions of dollars annually from security attacks such as malicious reverse engineering. To protect sensitive parts of software from such attacks, we designed a code obfuscation scheme based on nontrivial code clones. While implementing this scheme, we realized that currently there is no framework to assist implementation of ...
Aniket Kulkarni, Ravindra Metta
openaire +1 more source
Data obfuscation with network coding
Computer Communications, 2012Network coding techniques such as fountain codes are a promising way to disseminate large bulks of data in a multicast manner over an unreliable medium. In this work we investigate how to conceal such an encoded data stream on its way to numerous receivers with a minimum investment.
Hessler A. +3 more
openaire +1 more source
Protecting Java code via code obfuscation
XRDS: Crossroads, The ACM Magazine for Students, 1998The Java language is compiled into a platform independent bytecode format. Much of the information contained in the original source code remains in the bytecode, thus decompilation is easy. We will examine how code obfuscation can help protect Java bytecodes.
openaire +1 more source
The malicious code hiding techniques, code obfuscation problem
2014 IEEE 12th IEEE International Conference on Emerging eLearning Technologies and Applications (ICETA), 2014Nowadays, in world of modern technologies and technology society, information can be the most valuable commodity on the market and so gathering it, buy or sell it becomes the most important part of doing business. Because of the prizing, the more sophisticated ways of gathering and processing of the information are still being developed, various kinds ...
Jan Hurtuk +3 more
openaire +1 more source
Hidden System APIs Based Code Obfuscation
Applied Mechanics and Materials, 2015For the problem that static disassembly can expose system API calls in programs, this paper proposes a kind of code obfuscation aimed at hiding system API calls from reverse analysis. The algorithm is implemented by creating a system API address table and constructing secret index variables.
Fei Xiang +3 more
openaire +1 more source
Hardware-assisted code obfuscation
2014Software obfuscation is a longstanding and open research challenge in computer security. While theoretical results indicate that provably secure obfuscation in general is impossible to achieve, many application areas (e.g. malware, commercial software, etc.) show that software obfuscation is indeed employed in practice.
openaire +1 more source
Source Code Obfuscation for Smart Contracts
2020 27th Asia-Pacific Software Engineering Conference (APSEC), 2020State-of-the-art work of evaluating smart contract static analysis tools faces a major problem: most test cases (i.e., labeled buggy contracts) are too simple and lack complexity, which makes the evaluation unable to show the real performance of the analysis tools when complex contracts are analyzed.
Meng Zhang +3 more
openaire +1 more source
Code-Based Conjunction Obfuscation
Chinese Journal of Electronics, 2023Zheng Zhang +2 more
openaire +1 more source

