Results 251 to 260 of about 26,866 (284)
Some of the next articles are maybe not open access.
Control code obfuscation by abstract interpretation
Third IEEE International Conference on Software Engineering and Formal Methods (SEFM'05), 2005Control code obfuscation is intended to prevent malicious reverse engineering of software by masking the program control flow. These obfuscating transformations often rely on the existence of opaque predicates, that support the design of transformations that break up the program control flow. We prove that an algorithm for control obfuscation by opaque
DALLA PREDA, Mila, GIACOBAZZI, Roberto
openaire +2 more sources
Evading Virus Detection Using Code Obfuscation
2010The conflict between malware authors and analysts is heating up as both are coming up with new armaments in their armory. Malware authors are employing novel sophisticated techniques like metamorphosis to thwart detection mechanisms while security professionals are budding new ways to confront them. In this paper we formally treat diverse mechanisms of
Murad, Khurram +3 more
openaire +1 more source
Efficient Code Obfuscation for Android
2013Recent years have witnessed a steady shift in technology from desktop computers to mobile devices. In the global picture of available mobile platforms, Android stands out as a dominant participant on the market and its popularity continues rising. While beneficial for its users, this growth simultaneously creates a prolific environment for exploitation
openaire +1 more source
Formal Methods Meet Mobile Code Obfuscation
2017Android represents the most widespread mobile environment. This increasing diffusion is the reason why attackers are attracted to develop malware targeting this platform. Malware writers usually use code obfuscation techniques in order to evade the current antimalware detection and to generate new malware variants.
A. Cimitile +4 more
openaire +3 more sources
Code obfuscation based on deep integration
The Computer JournalAbstract Code obfuscation is essential for software security. However, current obfuscation techniques demonstrate limited resilience against systematic reverse engineering attacks—including taint analysis and code similarity detection.
Xiaobing Xiong +3 more
openaire +1 more source
Mass Spectrometry-Based Techniques to Elucidate the Sugar Code
Chemical Reviews, 2022Márkó Grabarics +2 more
exaly
An expanded lexicon for the ubiquitin code
Nature Reviews Molecular Cell Biology, 2022Ivan Đikić, Brenda A Schulman
exaly
Modern Static Analysis of Obfuscated Code
Proceedings of the 3rd ACM Workshop on Software Protection, 2019Static analysis tools have improved significantly in recent years with advances in intermediate representations, symbolic execution, constraint solving, control flow recovery, and static data flow analysis. Scripting of static analysis has improved at an even faster pace, with new APIs allowing easy access to extend or modify the building blocks that ...
openaire +1 more source
Evaluation of Code Obfuscating Transformation
Journal of Software, 2012Yu-Jie ZHAO +4 more
openaire +1 more source

