Results 61 to 70 of about 217 (114)
Using Exception Handling to Build Opaque Predicates in Intermediate Code Obfuscation Techniques
Microsoft's .NET Framework, and JAVA platforms, are based in a just-in-time compilation philosophy. Software developed using these technologies is executed in a hardware independent framework, which provides a full object-oriented environment, and in ...
Daniel Dolz, Gerardo Parra
doaj
Software deobfuscation methods: analysis and implementation
This paper describes the work on development of the deobfuscation software. The main target of the developed software is the analysis of the obfuscated malware code.
Sh. F. Kurmangaleev +5 more
doaj
Analysis of obfuscated CIL code
Abstract This thesis focuses on a technique known as obfuscation. The area has been given much attention in recent years as a low cost technique for software protection. There are already numerous papers concerned with techniques for both obfuscation and deobfuscation, but there are still many untouched issues, and little have been done in practice ...
openaire +1 more source
Code Obfuscation Study Using Obfuscator-LLVM
openaire +1 more source
Modern obfuscation methods for secure coding
openaire +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
Data Hiding Using Code Obfuscation
Proceedings of the 16th International Conference on Availability, Reliability and Security, 2021Digital transformation of many companies and government administrations, now accelerated by the pandemic, provides cybercriminals an increased opportunity of incorporating various types of information hiding techniques into the malicious software and by that perform different types of attacks.
Pawel Rajba, Wojciech Mazurczyk
openaire +1 more source
2017 2nd International Conference on Communication Systems, Computing and IT Applications (CSCITA), 2017
Software Reverse Engineering scenario would involve software that has been worked upon for years and carries several modules of a business in its lines of code. Unfortunately the source code of the application has been lost, what remains is “native” or “binary” code. Traditional obfuscators work on binary code but they are tedious and do not provide us
Pratik Kanani +4 more
openaire +1 more source
Software Reverse Engineering scenario would involve software that has been worked upon for years and carries several modules of a business in its lines of code. Unfortunately the source code of the application has been lost, what remains is “native” or “binary” code. Traditional obfuscators work on binary code but they are tedious and do not provide us
Pratik Kanani +4 more
openaire +1 more source
Obfuscated Code Quality Measurement
2019 XXIX International Scientific Symposium "Metrology and Metrology Assurance" (MMA), 2019Nowadays, number of cyber-attacks aimed at software increases. Thus, improving the quality of software security services becomes acute. Confidentiality is one of the basic security services. It is provided, including through the use of obfuscation mechanism. Code quality measurement Methods has been investigated. Particular attention is paid to methods
Serhii Semenov +2 more
openaire +1 more source

