Results 31 to 40 of about 26,866 (284)
Code obfuscation against symbolic execution attacks
Code obfuscation is widely used by software developers to protect intellectual property, and malware writers to hamper program analysis. However, there seems to be little work on systematic evaluations of effectiveness of obfuscation techniques against automated program analysis.
Sebastian Banescu +4 more
openaire +2 more sources
Hybrid Obfuscation Using Signals and Encryption
Obfuscation of software and data is one of the subcategories of software security. Hence, the outlines of the obfuscation problem and its various methods have been studied in this article.
Bahare Hashemzade, Ali Maroosi
doaj +1 more source
Achieving Obfuscation Through Self-Modifying Code: A Theoretical Model [PDF]
With the extreme amount of data and software available on networks, the protection of online information is one of the most important tasks of this technological age.
Waddell, Heidi
core +1 more source
Exploiting code mobility for dynamic binary obfuscation [PDF]
Software protection aims at protecting the integrity of software applications deployed on un-trusted hosts and being subject to illegal analysis. Within an un-trusted environment a possibly malicious user has complete access to system resources and tools
Barberis, Davide +4 more
core +2 more sources
Towards experimental evaluation of code obfuscation techniques [PDF]
While many obfuscation schemes proposed, none of them satisfy any strong definition of obfuscation. Furthermore secure general-purpose obfuscation algorithms have been proven to be impossible. Nevertheless, obfuscation schemes which in practice slow down malicious reverse-engineering by obstructing code comprehension for even short periods of time are ...
CECCATO, MARIANO +6 more
openaire +3 more sources
A large study on the effect of code obfuscation on the quality of java code [PDF]
Context: Obfuscation is a common technique used to protect software against malicious reverse engineering. Obfuscators manipulate the source code to make it harder to analyze and more difficult to understand for the attacker.
Boldyreff, Cornelia +7 more
core +4 more sources
Anti-semantic Analysis Script Fusion Technology [PDF]
In recent years,script programs have been widely used in the field of computer science.Script programs are increasingly being used in the current network environment due to their powerful functionality and high execution efficiency,simpler writing and ...
TIAN Bowen, YANG Ju, XIONG Xiaobing, DUAN Shuang, WEI Ran
doaj +1 more source
Hybrid Obfuscation Technique to Protect Source Code From Prohibited Software Reverse Engineering
In this research, a new Hybrid Obfuscation Technique was proposed to prevent prohibited Reverse Engineering. The proposed hybrid technique contains three approaches; first approach is string encryption.
Asma'a Mahfoud Hezam Al-Hakimi +4 more
doaj +1 more source
Exploiting dynamic scheduling for VM-based code obfuscation [PDF]
Code virtualization built upon virtual machine (VM) technologies is emerging as a viable method for implementing code obfuscation to protect programs against unauthorized analysis.
Chen, Xiaojiang +8 more
core +1 more source
Leveraging WebAssembly for Numerical JavaScript Code Virtualization
Code obfuscation built upon code virtualization technology is one of the viable means for protecting sensitive algorithms and data against code reverse engineering attacks. Code virtualization has been successfully applied to programming languages like C,
Shuai Wang +10 more
doaj +1 more source

