Results 51 to 60 of about 27,012 (180)

Are our clone detectors good enough? An empirical study of code effects by obfuscation

open access: yesCybersecurity, 2023
Clone detection has received much attention in many fields such as malicious code detection, vulnerability hunting, and code copyright infringement detection. However, cyber criminals may obfuscate code to impede violation detection. To date, few studies
Weihao Huang   +5 more
doaj   +1 more source

On the Effectiveness of Perturbations in Generating Evasive Malware Variants

open access: yesIEEE Access, 2023
Malware variants are generated using various evasion techniques to bypass malware detectors, so it is important to understand what properties make them evade malware detection techniques.
Beomjin Jin   +3 more
doaj   +1 more source

Exploiting code mobility for dynamic binary obfuscation [PDF]

open access: yes, 2011
Software protection aims at protecting the integrity of software applications deployed on un-trusted hosts and being subject to illegal analysis. Within an un-trusted environment a possibly malicious user has complete access to system resources and tools
Barberis, Davide   +4 more
core   +2 more sources

Impact of Code Deobfuscation and Feature Interaction in Android Malware Detection

open access: yesIEEE Access, 2021
With more than three million applications already in the Android marketplace, various malware detection systems based on machine learning have been proposed to prevent attacks from cybercriminals; most of these systems use static analyses to extract ...
Yun-Chung Chen   +4 more
doaj   +1 more source

Obfuscapk: An open-source black-box obfuscation tool for Android apps

open access: yesSoftwareX, 2020
Obfuscapk is an open-source automatic obfuscation tool for Android apps that works in a black-box fashion (i.e., it does not need the app source code).
Simone Aonzo   +3 more
doaj   +1 more source

Zero-Knowledge and Code Obfuscation [PDF]

open access: yes, 2000
In this paper, we investigate the gap between auxiliary-input zero-knowledge (AIZK) and blackbox-simulation zero-knowledge (BSZK). It is an interesting open problem whether or not there exists a protocol which achieves AIZK, but not BSZK. We show that the existence of such a protocol is closely related to the existence of secure code obfuscators.
openaire   +1 more source

Targeting Infeasibility Questions on Obfuscated Codes

open access: yesCoRR, 2016
Software deobfuscation is a crucial activity in security analysis and especially, in malware analysis. While standard static and dynamic approaches suffer from well-known shortcomings, Dynamic Symbolic Execution (DSE) has recently been proposed has an interesting alternative, more robust than static analysis and more complete than dynamic analysis. Yet,
Robin David   +2 more
openaire   +2 more sources

FPGA based remote code integrity verification of programs in distributed embedded systems [PDF]

open access: yes, 2012
The explosive growth of networked embedded systems has made ubiquitous and pervasive computing a reality. However, there are still a number of new challenges to its widespread adoption that include scalability, availability, and, especially, security of ...
Basile, Cataldo   +2 more
core   +1 more source

Dynamic analysis of virtualization- and dispatching-obfuscated applications

open access: yesТруды Института системного программирования РАН, 2018
Obfuscation algorithms are now widely used to prevent software reverse engineering. Binary code virtualization is one of the most powerful obfuscations technics.
M. G. Bakulin   +5 more
doaj   +1 more source

PDF-Malware Detection: A Survey and Taxonomy of Current Techniques [PDF]

open access: yes, 2018
Portable Document Format, more commonly known as PDF, has become, in the last 20 years, a standard for document exchange and dissemination due its portable nature and widespread adoption. The flexibility and power of this format are not only leveraged by
Aniello, L.   +3 more
core   +1 more source

Home - About - Disclaimer - Privacy