Results 251 to 260 of about 26,866 (284)
Some of the next articles are maybe not open access.

Control code obfuscation by abstract interpretation

Third IEEE International Conference on Software Engineering and Formal Methods (SEFM'05), 2005
Control code obfuscation is intended to prevent malicious reverse engineering of software by masking the program control flow. These obfuscating transformations often rely on the existence of opaque predicates, that support the design of transformations that break up the program control flow. We prove that an algorithm for control obfuscation by opaque
DALLA PREDA, Mila, GIACOBAZZI, Roberto
openaire   +2 more sources

Evading Virus Detection Using Code Obfuscation

2010
The conflict between malware authors and analysts is heating up as both are coming up with new armaments in their armory. Malware authors are employing novel sophisticated techniques like metamorphosis to thwart detection mechanisms while security professionals are budding new ways to confront them. In this paper we formally treat diverse mechanisms of
Murad, Khurram   +3 more
openaire   +1 more source

Efficient Code Obfuscation for Android

2013
Recent years have witnessed a steady shift in technology from desktop computers to mobile devices. In the global picture of available mobile platforms, Android stands out as a dominant participant on the market and its popularity continues rising. While beneficial for its users, this growth simultaneously creates a prolific environment for exploitation
openaire   +1 more source

Formal Methods Meet Mobile Code Obfuscation

2017
Android represents the most widespread mobile environment. This increasing diffusion is the reason why attackers are attracted to develop malware targeting this platform. Malware writers usually use code obfuscation techniques in order to evade the current antimalware detection and to generate new malware variants.
A. Cimitile   +4 more
openaire   +3 more sources

Code obfuscation based on deep integration

The Computer Journal
Abstract Code obfuscation is essential for software security. However, current obfuscation techniques demonstrate limited resilience against systematic reverse engineering attacks—including taint analysis and code similarity detection.
Xiaobing Xiong   +3 more
openaire   +1 more source

Mass Spectrometry-Based Techniques to Elucidate the Sugar Code

Chemical Reviews, 2022
Márkó Grabarics   +2 more
exaly  

An expanded lexicon for the ubiquitin code

Nature Reviews Molecular Cell Biology, 2022
Ivan Đikić, Brenda A Schulman
exaly  

Modern Static Analysis of Obfuscated Code

Proceedings of the 3rd ACM Workshop on Software Protection, 2019
Static analysis tools have improved significantly in recent years with advances in intermediate representations, symbolic execution, constraint solving, control flow recovery, and static data flow analysis. Scripting of static analysis has improved at an even faster pace, with new APIs allowing easy access to extend or modify the building blocks that ...
openaire   +1 more source

Demystifying the O-GlcNAc Code: A Systems View

Chemical Reviews, 2022
Junfeng, Ci Wu
exaly  

Evaluation of Code Obfuscating Transformation

Journal of Software, 2012
Yu-Jie ZHAO   +4 more
openaire   +1 more source

Home - About - Disclaimer - Privacy