Results 51 to 60 of about 217 (114)

The method of generation program code with indistinguishable functionality

open access: yesБезопасность информационных технологий, 2017
The paper presents an obfuscation problem, in which indistinguishability is considered relatively to programs with distinguishable functionality. The functionality remains undisclosed owing to unknown parameters in the program’s input.
Mikhail Andreevich Styugin
doaj   +1 more source

Security Assessment of Code Obfuscation Based on Dynamic Monitoring in Android Things

open access: yesIEEE Access, 2017
Android-based Internet-of-Things devices with excellent compatibility and openness are constantly emerging. A typical example is Android Things that Google supports.
Taejoo Cho, Hyunki Kim, Jeong Hyun Yi
doaj   +1 more source

An Approach to Reconstruction of Control Flow of an Obfuscated Program

open access: yesТруды Института системного программирования РАН, 2018
Control flow obfuscation is one of widespread methods used to protect application binary code from analysis. The obfuscation transformations dramatically increase the complexity of separation and recognition of the algorithm and data structures.
Ilya N. Ledovskikh, Maxim G. Bakulin
doaj  

Can LLMs Obfuscate Code? A Systematic Analysis of Large Language Models into Assembly Code Obfuscation

open access: yesProceedings of the AAAI Conference on Artificial Intelligence
Malware authors often employ code obfuscations to make their malware harder to detect. Existing tools for generating obfuscated code often require access to the original source code (e.g., C++ or Java), and adding new obfuscations is a non-trivial, labor-intensive process.
Mohseni, Seyedreza   +7 more
openaire   +2 more sources

Software code protection through software obfuscation [PDF]

open access: yes, 2019
The mode of platform-independent software running on client machine has various advantages. But it also introduces some problems, such as how to guard against software piracy, how to protect user from intellectual property theft and from attacks by malicious modifications.
openaire   +2 more sources

Targeting Infeasibility Questions on Obfuscated Codes

open access: yes, 2016
Software deobfuscation is a crucial activity in security analysis and especially, in malware analysis. While standard static and dynamic approaches suffer from well-known shortcomings, Dynamic Symbolic Execution (DSE) has recently been proposed has an interesting alternative, more robust than static analysis and more complete than dynamic analysis. Yet,
David, Robin   +2 more
openaire   +2 more sources

Hardware and Software Methods for Secure Obfuscation and Deobfuscation: An In-Depth Analysis

open access: yesComputers
The swift evolution of information technology and growing connectivity in critical applications have elevated cybersecurity, protecting and certifying software and designs against rising cyber threats.
Khaled Saleh   +4 more
doaj   +1 more source

The Technique of Binary Code Decompilation and Its Application in Information Security Sphere

open access: yesБезопасность информационных технологий, 2012
The authors describes a new technique of binary code decompilation and its application possibility in information security such as software protection against reverse engineering and code obfuscation analyze in malware.
M. O. Shudrak   +2 more
doaj  

Enhancing Two-Factor Authentication Security by Analyzing and Detecting SMS OTP-Interception Techniques in Android Malware

open access: yesIEEE Access
Two-factor authentication (2FA) is a foundational security mechanism that significantly enhances user identity verification’s reliability. Despite the availability of various 2FA implementation methods, a considerable proportion still relies on ...
Maciej Bartlomiejczyk   +2 more
doaj   +1 more source

Platform Independent Code Obfuscation

open access: yes, 2013
Code obfuscation is a technique used to make soft- ware more difficult to read and reverse engineer. It is used in the industry to protect proprietary algo- rithms and to protect the software from unintended use. The current state of the art solutions in the in- dustry depend on specific platform targets.
openaire   +2 more sources

Home - About - Disclaimer - Privacy