Results 41 to 50 of about 217 (114)

Toward Efficient Deobfuscation via Large Language Models

open access: yesIEEE Access
Obfuscation modifies code structure to impede reverse engineering and is widely used to protect intellectual property and evade malware detection. However, existing deobfuscation techniques largely rely on analyst-driven heuristics or are tailored to ...
Byunggeon Choi   +3 more
doaj   +1 more source

Assessment of Source Code Obfuscation Techniques [PDF]

open access: yes2016 IEEE 16th International Working Conference on Source Code Analysis and Manipulation (SCAM), 2016
Obfuscation techniques are a general category of software protections widely adopted to prevent malicious tampering of the code by making applications more difficult to understand and thus harder to modify. Obfuscation techniques are divided in code and data obfuscation, depending on the protected asset.
VITICCHIE', ALESSIO   +6 more
openaire   +2 more sources

Code Obfuscation: A Comprehensive Approach to Detection, Classification, and Ethical Challenges

open access: yesAlgorithms
Code obfuscation has become an essential practice in modern software development, designed to make source or machine code challenging for both humans and computers to comprehend.
Tomer Raitsis   +5 more
doaj   +1 more source

Zero-Knowledge and Code Obfuscation [PDF]

open access: yes, 2000
In this paper, we investigate the gap between auxiliary-input zero-knowledge (AIZK) and blackbox-simulation zero-knowledge (BSZK). It is an interesting open problem whether or not there exists a protocol which achieves AIZK, but not BSZK. We show that the existence of such a protocol is closely related to the existence of secure code obfuscators.
openaire   +1 more source

Pure Infinitely Self-Modifying Code is Realizable and Turing-complete [PDF]

open access: yesInternational Journal of Electronics and Telecommunications, 2018
Although self-modifying code has been shyed away from due to its complexity and discouragement due to safety issues, it nevertheless provides for a very unique obfuscation method and a different perspective on the relationship between data and code.
Gregory Morse
doaj   +1 more source

Different Obfuscation Techniques for Code Protection

open access: yesProcedia Computer Science, 2015
AbstractWith the advancements in digital technology, the threat of unimaginable level of duplicating and illegal reproducing of software also increases. Therefore the piracy rate is increasing proportionally. This scenario has clearly placed the threat for the software manufacturers and leads to the development of numerous software protection ...
Behera, Chandan Kumar   +1 more
openaire   +1 more source

Language and Obfuscation Oblivious Source Code Authorship Attribution

open access: yesIEEE Access, 2020
Source Code Authorship Attribution can answer many interesting questions such as: Who wrote the malicious source code? Is the source code plagiarized, and does it infringe on copyright?
Sarim Zafar   +3 more
doaj   +1 more source

Classification of Obfuscation Techniques in LLVM IR: Machine Learning on Vector Representations

open access: yesMachine Learning and Knowledge Extraction
We present a novel methodology for classifying code obfuscation techniques in LLVM IR program embeddings. We apply isolated and layered code obfuscations to C source code using the Tigress obfuscator, compile them to LLVM IR, and convert each IR code ...
Sebastian Raubitzek   +3 more
doaj   +1 more source

An Android Malicious Code Detection Method Based on Improved DCA Algorithm

open access: yesEntropy, 2017
Recently, Android malicious code has increased dramatically and the technology of reinforcement is increasingly powerful. Due to the development of code obfuscation and polymorphic deformation technology, the current Android malicious code static ...
Chundong Wang   +5 more
doaj   +1 more source

Deobfuscation, unpacking, and decoding of obfuscated malicious JavaScript for machine learning models detection performance improvement

open access: yesCAAI Transactions on Intelligence Technology, 2020
Obfuscation is rampant in both benign and malicious JavaScript (JS) codes. It generates an obscure and undetectable code that hinders comprehension and analysis. Therefore, accurate detection of JS codes that masquerade as innocuous scripts is vital. The
Samuel Ndichu   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy