Results 31 to 40 of about 27,012 (180)

Understanding Android Obfuscation Techniques: A Large-Scale Investigation in the Wild [PDF]

open access: yes, 2018
In this paper, we seek to better understand Android obfuscation and depict a holistic view of the usage of obfuscation through a large-scale investigation in the wild.
Chen, Kai   +9 more
core   +2 more sources

Enhanced Metamorphic Techniques-A Case Study Against Havex Malware

open access: yesIEEE Access, 2021
Most of the commercial antiviruses are signature based, that is, they use existing database signature to detect the malware. Malware authors use code obfuscation techniques in their variety of malware with the aim of bypassing detection by antiviruses ...
Zainub Mumtaz   +4 more
doaj   +1 more source

APIASO: A Novel API Call Obfuscation Technique Based on Address Space Obscurity

open access: yesApplied Sciences, 2023
API calls are programming interfaces used by applications. When it is difficult for an analyst to perform a direct reverse analysis of a program, the API provides an important basis for analyzing the behavior and functionality of the program. API address
Yang Li   +5 more
doaj   +1 more source

Genetic Improvement for Code Obfuscation [PDF]

open access: yesProceedings of the 2016 on Genetic and Evolutionary Computation Conference Companion, 2016
Genetic improvement (GI) is a relatively new area of software engineering and thus the extent of its applicability is yet to be explored. Although a growing interest in GI in recent years started with the work on automatic bug fixing, the area flourished when results on optimisation of non-functional software properties, such as efficiency and energy ...
openaire   +1 more source

Partial Evaluation for Java Malware Detection [PDF]

open access: yes, 2015
The fact that Java is platform independent gives hackers the opportunity to write exploits that can target users on any platform, which has a JVM implementation. Metasploit is a well-known source of Java exploits and to circumvent detection by Anti Virus
A Flexeder   +6 more
core   +1 more source

Protecting Software through Obfuscation:Can It Keep Pace with Progress in Code Analysis? [PDF]

open access: yes, 2016
Software obfuscation has always been a controversially discussed research area. While theoretical results indicate that provably secure obfuscation in general is impossible, its widespread application in malware and commercial software shows that it is ...
Katzenbeisser, Stefan   +4 more
core   +1 more source

PowerDrive: Accurate De-Obfuscation and Analysis of PowerShell Malware [PDF]

open access: yes, 2019
PowerShell is nowadays a widely-used technology to administrate and manage Windows-based operating systems. However, it is also extensively used by malware vectors to execute payloads or drop additional malicious contents.
Cara, Fabrizio   +3 more
core   +2 more sources

Partial Evaluation of String Obfuscations for Java Malware Detection [PDF]

open access: yes, 2016
The fact that Java is platform independent gives hackers the opportunity to write exploits that can target users on any platform, which has a JVM implementation. Metasploit is a well-known source of Javaexploits and to circumvent detection by Anti Virus (
Chawdhary, Aziem   +2 more
core   +1 more source

Common Program Similarity Metric Method for Anti-Obfuscation

open access: yesIEEE Access, 2018
Program similarity metrics, especially malware similarity metrics, have long been an area of active research. However, code obfuscation techniques bring many challenges to similarity analysis.
Xiaochuan Zhang   +2 more
doaj   +1 more source

Hybrid Obfuscation Using Signals and Encryption

open access: yesJournal of Computer Networks and Communications, 2018
Obfuscation of software and data is one of the subcategories of software security. Hence, the outlines of the obfuscation problem and its various methods have been studied in this article.
Bahare Hashemzade, Ali Maroosi
doaj   +1 more source

Home - About - Disclaimer - Privacy