Results 21 to 30 of about 27,012 (180)
Understanding Obfuscated Code [PDF]
Code obfuscation makes it harder for a security analyst to understand the malicious payload of a program. In most cases an analyst needs to study the program at the machine code level, with little or no extra information available, apart from his experience.
Madou, Matias +2 more
openaire +2 more sources
Review of path branch obfuscation
Code obfuscation is a convenient and effective technique of software protection,which can combat MATE attacks based on reverse engineering.With the development of automatic programming analysis technology,a new code obfuscation technique which named path
Pu GENG, Yuefei ZHU
doaj +3 more sources
Research on construction of conditional exception code used in branch obfuscation
Using conditional exception code construction and exception handler to replace conditional jump code,the branch obfuscation get the right branch selection,but the address of branch point was concealed,so this obfuscation method can defeat symbolic ...
Pu GENG, Yuefei ZHU
doaj +3 more sources
Control Flow Obfuscation Algorithm Based on Nesting Complexity [PDF]
The garbage code control flow obfuscation algorithm based on random insertion strategy has uncertain obfuscation potency and extra overhead.To solve the problem,a control flow Obfuscation algorithm based on Nesting Complexity(OB_NC) is proposed.The ...
WANG Lei,HOU Zhengfeng,XIANG Runzhao,SHI Zhaopeng
doaj +1 more source
The main goal of obfuscation is to make software difficult to analyze. Although obfuscation is one useful method to protect programs, the ability to analyze malware is greatly reduced if used for malicious purposes.
Jae Hyuk Suk +2 more
doaj +1 more source
Symbolic Execution of Obfuscated Code [PDF]
Symbolic and concolic execution nd important applications in a number of security-related program analyses, including analysis of malicious code. However, malicious code tend to very often be obfuscated, and current concolic analysis techniques have trouble dealing with some of these obfuscations, leading to imprecision and/or excessive resource usage.
Babak Yadegari, Saumya Debray
openaire +1 more source
Locating Third-party Library Functions in Obfuscated Applications [PDF]
Third-party libraries are an important part of Android applications.When enforcing security enhancement or analysis based on application repackaging,it is often necessary to locate specific functions in third-party library.To this end,there is a need to ...
YUAN Jiangfeng, LI Haoxiang, YOU Wei, HUANG Jianjun, SHI Wenchang, LIANG Bin
doaj +1 more source
InfoScrub: Towards Attribute Privacy by Targeted Obfuscation [PDF]
Personal photos of individuals when shared online, apart from exhibiting a myriad of memorable details, also reveals a wide range of private information and potentially entails privacy risks (e.g., online harassment, tracking). To mitigate such risks, it
Fritz, Mario +2 more
core +2 more sources
The rise of obfuscated Android malware and impacts on detection methods [PDF]
The various application markets are facing an exponential growth of Android malware. Every day, thousands of new Android malware applications emerge. Android malware hackers adopt reverse engineering and repackage benign applications with their malicious
Wael F. Elsersy +2 more
doaj +2 more sources
Deoptfuscator: Defeating Advanced Control-Flow Obfuscation Using Android Runtime (ART)
Code obfuscation is a technique that makes it difficult for code analyzers to understand a program by transforming its structures or operations while maintaining its original functionality.
Geunha You +4 more
doaj +1 more source

