VCF: Virtual Code Folding to Enhance Virtualization Obfuscation
Code virtualization, also called virtualization obfuscation, is a code obfuscation technique that protects software from malicious analysis. Unlike code packing or code encryption techniques, code virtualization does not restore the original code on the ...
Jae Hyuk Suk, Dong Hoon Lee
doaj +1 more source
Are our clone detectors good enough? An empirical study of code effects by obfuscation
Clone detection has received much attention in many fields such as malicious code detection, vulnerability hunting, and code copyright infringement detection. However, cyber criminals may obfuscate code to impede violation detection. To date, few studies
Weihao Huang +5 more
doaj +1 more source
On the Effectiveness of Perturbations in Generating Evasive Malware Variants
Malware variants are generated using various evasion techniques to bypass malware detectors, so it is important to understand what properties make them evade malware detection techniques.
Beomjin Jin +3 more
doaj +1 more source
Obfuscapk: An open-source black-box obfuscation tool for Android apps
Obfuscapk is an open-source automatic obfuscation tool for Android apps that works in a black-box fashion (i.e., it does not need the app source code).
Simone Aonzo +3 more
doaj +1 more source
Impact of Code Deobfuscation and Feature Interaction in Android Malware Detection
With more than three million applications already in the Android marketplace, various malware detection systems based on machine learning have been proposed to prevent attacks from cybercriminals; most of these systems use static analyses to extract ...
Yun-Chung Chen +4 more
doaj +1 more source
PDF-Malware Detection: A Survey and Taxonomy of Current Techniques [PDF]
Portable Document Format, more commonly known as PDF, has become, in the last 20 years, a standard for document exchange and dissemination due its portable nature and widespread adoption. The flexibility and power of this format are not only leveraged by
Aniello, L. +3 more
core +1 more source
Dynamic analysis of virtualization- and dispatching-obfuscated applications
Obfuscation algorithms are now widely used to prevent software reverse engineering. Binary code virtualization is one of the most powerful obfuscations technics.
M. G. Bakulin +5 more
doaj +1 more source
ERMDS: A obfuscation dataset for evaluating robustness of learning-based malware detection system
Learning-based malware detection systems (LB-MDS) play a crucial role in defending computer systems from malicious attacks. Nevertheless, these systems can be vulnerable to various attacks, which can have significant consequences.
Lichen Jia +3 more
doaj +1 more source
Genetic Improvement for Code Obfuscation [PDF]
Genetic improvement (GI) is a relatively new area of software engineering and thus the extent of its applicability is yet to be explored. Although a growing interest in GI in recent years started with the work on automatic bug fixing, the area flourished when results on optimisation of non-functional software properties, such as efficiency and energy ...
openaire +1 more source
Applying an Ethical Lens to the Treatment of People With Multiple Sclerosis
ABSTRACT The practice of neurology requires an understanding of clinical ethics for decision‐making. In multiple sclerosis (MS) care, there are a wide range of ethical considerations that may arise. These involve shared decision‐making around selection of a disease‐modifying therapy (DMT), risks and benefits of well‐studied medications in comparison to
Methma Udawatta, Farrah J. Mateen
wiley +1 more source

