Results 41 to 50 of about 27,012 (180)

Achieving Obfuscation Through Self-Modifying Code: A Theoretical Model [PDF]

open access: yes, 2020
With the extreme amount of data and software available on networks, the protection of online information is one of the most important tasks of this technological age.
Waddell, Heidi
core   +1 more source

Exploiting dynamic scheduling for VM-based code obfuscation [PDF]

open access: yes, 2016
Code virtualization built upon virtual machine (VM) technologies is emerging as a viable method for implementing code obfuscation to protect programs against unauthorized analysis.
Chen, Xiaojiang   +8 more
core   +1 more source

CodeTrolley: Hardware-Assisted Control Flow Obfuscation [PDF]

open access: yes, 2019
Many cybersecurity attacks rely on analyzing a binary executable to find exploitable sections of code. Code obfuscation is used to prevent attackers from reverse engineering these executables.
Boskov, Novak   +2 more
core   +1 more source

C Source code Obfuscation using Hash Function and Encryption Algorithm

open access: yesIJCCS (Indonesian Journal of Computing and Cybernetics Systems), 2023
Obfuscation is a technique for transforming program code into a different form that is more difficult to understand. Several obfuscation methods are used to obfuscate source code, including dead code insertion, code transposition, and string encryption ...
Sarah Rosdiana Tambunan, Nur Rokhman
doaj   +1 more source

Leveraging WebAssembly for Numerical JavaScript Code Virtualization

open access: yesIEEE Access, 2019
Code obfuscation built upon code virtualization technology is one of the viable means for protecting sensitive algorithms and data against code reverse engineering attacks. Code virtualization has been successfully applied to programming languages like C,
Shuai Wang   +10 more
doaj   +1 more source

Obfuscation-based malware update: A comparison of manual and automated methods [PDF]

open access: yes, 2017
Indexación: Scopus; Web of Science.This research presents a proposal of malware classification and its update based on capacity and obfuscation. This article is an extension of [4]a, and describes the procedure for malware updating, that is, to take ...
Barría, C.   +4 more
core   +2 more sources

Deobfuscation: Reverse Engineering Obfuscated Code [PDF]

open access: yes12th Working Conference on Reverse Engineering (WCRE'05), 2006
In recent years, code obfuscation has attracted attention as a low cost approach to improving software security by making it difficult for attackers to understand the inner workings of proprietary software systems. This paper examines techniques for automatic deobfuscation of obfuscated programs, as a step towards reverse engineering such programs. Our
Sharath K. Udupa   +2 more
openaire   +1 more source

Anti-semantic Analysis Script Fusion Technology [PDF]

open access: yesJisuanji kexue
In recent years,script programs have been widely used in the field of computer science.Script programs are increasingly being used in the current network environment due to their powerful functionality and high execution efficiency,simpler writing and ...
TIAN Bowen, YANG Ju, XIONG Xiaobing, DUAN Shuang, WEI Ran
doaj   +1 more source

Using HTML5 to Prevent Detection of Drive-by-Download Web Malware [PDF]

open access: yes, 2014
The web is experiencing an explosive growth in the last years. New technologies are introduced at a very fast-pace with the aim of narrowing the gap between web-based applications and traditional desktop applications.
De Maio, Giancarlo   +2 more
core   +2 more sources

VCF: Virtual Code Folding to Enhance Virtualization Obfuscation

open access: yesIEEE Access, 2020
Code virtualization, also called virtualization obfuscation, is a code obfuscation technique that protects software from malicious analysis. Unlike code packing or code encryption techniques, code virtualization does not restore the original code on the ...
Jae Hyuk Suk, Dong Hoon Lee
doaj   +1 more source

Home - About - Disclaimer - Privacy