Results 31 to 40 of about 217 (114)

Impact of Code Deobfuscation and Feature Interaction in Android Malware Detection

open access: yesIEEE Access, 2021
With more than three million applications already in the Android marketplace, various malware detection systems based on machine learning have been proposed to prevent attacks from cybercriminals; most of these systems use static analyses to extract ...
Yun-Chung Chen   +4 more
doaj   +1 more source

Obfuscapk: An open-source black-box obfuscation tool for Android apps

open access: yesSoftwareX, 2020
Obfuscapk is an open-source automatic obfuscation tool for Android apps that works in a black-box fashion (i.e., it does not need the app source code).
Simone Aonzo   +3 more
doaj   +1 more source

Genetic Improvement for Code Obfuscation [PDF]

open access: yesProceedings of the 2016 on Genetic and Evolutionary Computation Conference Companion, 2016
Genetic improvement (GI) is a relatively new area of software engineering and thus the extent of its applicability is yet to be explored. Although a growing interest in GI in recent years started with the work on automatic bug fixing, the area flourished when results on optimisation of non-functional software properties, such as efficiency and energy ...
openaire   +1 more source

Dynamic analysis of virtualization- and dispatching-obfuscated applications

open access: yesТруды Института системного программирования РАН, 2018
Obfuscation algorithms are now widely used to prevent software reverse engineering. Binary code virtualization is one of the most powerful obfuscations technics.
M. G. Bakulin   +5 more
doaj   +1 more source

ASPECT-ORIENTED CODE OBFUSCATION

open access: yesSoftware Technology and Engineering, 2009
Aspect-oriented code obfuscation, Proceedings of the 2009 International Conference on Software Technology and Engineering Chennai, India pp. 252-257.
openaire   +2 more sources

On Characteristics of Symbolic Execution in the Problem of Assessing the Quality of Obfuscating Transformations

open access: yesМоделирование и анализ информационных систем, 2021
Obfuscation is used to protect programs from analysis and reverse engineering. There are theoretically effective and resistant obfuscation methods, but most of them are not implemented in practice yet.
Petr D. Borisov, Yury V. Kosolapov
doaj   +1 more source

Code Obfuscation Against Abstract Model Checking Attacks [PDF]

open access: yes, 2017
Code protection technologies require anti reverse engineering transformations to obfuscate programs in such a way that tools and methods for program analysis become ineffective. We introduce the concept of model deformation inducing an effective code obfuscation against attacks performed by abstract model checking.
Bruni Roberto   +2 more
openaire   +1 more source

RomaDroid: A Robust and Efficient Technique for Detecting Android App Clones Using a Tree Structure and Components of Each App’s Manifest File

open access: yesIEEE Access, 2019
There are various types of Android apps, such as entertainment apps, health and fitness apps, travel apps, educational apps, business apps, and so on. Android apps can contain business logic, maintain sensitive personal information, and act as a bridge ...
Byoungchul Kim   +3 more
doaj   +1 more source

Invalidating Analysis Knowledge for Code Virtualization Protection Through Partition Diversity

open access: yesIEEE Access, 2019
To protect programs from unauthorized analysis, virtualize the code based on Virtual Machine (VM) technologies is emerging as a feasible method for accomplishing code obfuscation.
Wei Wang   +9 more
doaj   +1 more source

A Framework to Quantify the Quality of Source Code Obfuscation

open access: yesApplied Sciences
Malicious reverse engineering of software has served as a valuable technique for attackers to infringe upon and steal intellectual property. We can employ obfuscation techniques to protect against such attackers as useful tools to safeguard software ...
Hongjoo Jin   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy