Results 21 to 30 of about 27,012 (180)

Understanding Obfuscated Code [PDF]

open access: yes14th IEEE International Conference on Program Comprehension (ICPC'06), 2006
Code obfuscation makes it harder for a security analyst to understand the malicious payload of a program. In most cases an analyst needs to study the program at the machine code level, with little or no extra information available, apart from his experience.
Madou, Matias   +2 more
openaire   +2 more sources

Review of path branch obfuscation

open access: yes网络与信息安全学报, 2020
Code obfuscation is a convenient and effective technique of software protection,which can combat MATE attacks based on reverse engineering.With the development of automatic programming analysis technology,a new code obfuscation technique which named path
Pu GENG, Yuefei ZHU
doaj   +3 more sources

Research on construction of conditional exception code used in branch obfuscation

open access: yes网络与信息安全学报, 2020
Using conditional exception code construction and exception handler to replace conditional jump code,the branch obfuscation get the right branch selection,but the address of branch point was concealed,so this obfuscation method can defeat symbolic ...
Pu GENG, Yuefei ZHU
doaj   +3 more sources

Control Flow Obfuscation Algorithm Based on Nesting Complexity [PDF]

open access: yesJisuanji gongcheng, 2016
The garbage code control flow obfuscation algorithm based on random insertion strategy has uncertain obfuscation potency and extra overhead.To solve the problem,a control flow Obfuscation algorithm based on Nesting Complexity(OB_NC) is proposed.The ...
WANG Lei,HOU Zhengfeng,XIANG Runzhao,SHI Zhaopeng
doaj   +1 more source

SCORE: Source Code Optimization & REconstruction

open access: yesIEEE Access, 2020
The main goal of obfuscation is to make software difficult to analyze. Although obfuscation is one useful method to protect programs, the ability to analyze malware is greatly reduced if used for malicious purposes.
Jae Hyuk Suk   +2 more
doaj   +1 more source

Symbolic Execution of Obfuscated Code [PDF]

open access: yesProceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015
Symbolic and concolic execution nd important applications in a number of security-related program analyses, including analysis of malicious code. However, malicious code tend to very often be obfuscated, and current concolic analysis techniques have trouble dealing with some of these obfuscations, leading to imprecision and/or excessive resource usage.
Babak Yadegari, Saumya Debray
openaire   +1 more source

Locating Third-party Library Functions in Obfuscated Applications [PDF]

open access: yesJisuanji kexue, 2023
Third-party libraries are an important part of Android applications.When enforcing security enhancement or analysis based on application repackaging,it is often necessary to locate specific functions in third-party library.To this end,there is a need to ...
YUAN Jiangfeng, LI Haoxiang, YOU Wei, HUANG Jianjun, SHI Wenchang, LIANG Bin
doaj   +1 more source

InfoScrub: Towards Attribute Privacy by Targeted Obfuscation [PDF]

open access: yes, 2021
Personal photos of individuals when shared online, apart from exhibiting a myriad of memorable details, also reveals a wide range of private information and potentially entails privacy risks (e.g., online harassment, tracking). To mitigate such risks, it
Fritz, Mario   +2 more
core   +2 more sources

The rise of obfuscated Android malware and impacts on detection methods [PDF]

open access: yesPeerJ Computer Science, 2022
The various application markets are facing an exponential growth of Android malware. Every day, thousands of new Android malware applications emerge. Android malware hackers adopt reverse engineering and repackage benign applications with their malicious
Wael F. Elsersy   +2 more
doaj   +2 more sources

Deoptfuscator: Defeating Advanced Control-Flow Obfuscation Using Android Runtime (ART)

open access: yesIEEE Access, 2022
Code obfuscation is a technique that makes it difficult for code analyzers to understand a program by transforming its structures or operations while maintaining its original functionality.
Geunha You   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy