Results 61 to 70 of about 217 (114)

Using Exception Handling to Build Opaque Predicates in Intermediate Code Obfuscation Techniques

open access: yesJournal of Computer Science and Technology, 2008
Microsoft's .NET Framework, and JAVA platforms, are based in a just-in-time compilation philosophy. Software developed using these technologies is executed in a hardware independent framework, which provides a full object-oriented environment, and in ...
Daniel Dolz, Gerardo Parra
doaj  

Software deobfuscation methods: analysis and implementation

open access: yesТруды Института системного программирования РАН, 2018
This paper describes the work on development of the deobfuscation software. The main target of the developed software is the analysis of the obfuscated malware code.
Sh. F. Kurmangaleev   +5 more
doaj  

Analysis of obfuscated CIL code

open access: yes, 2007
Abstract This thesis focuses on a technique known as obfuscation. The area has been given much attention in recent years as a low cost technique for software protection. There are already numerous papers concerned with techniques for both obfuscation and deobfuscation, but there are still many untouched issues, and little have been done in practice ...
openaire   +1 more source

Code Obfuscation Study Using Obfuscator-LLVM

open access: yesMcNair Scholars Research Journal, 2018
openaire   +1 more source

Modern obfuscation methods for secure coding

open access: yesUkrainian Scientific Journal of Information Security, 2016
openaire   +1 more source

Data Hiding Using Code Obfuscation

Proceedings of the 16th International Conference on Availability, Reliability and Security, 2021
Digital transformation of many companies and government administrations, now accelerated by the pandemic, provides cybercriminals an increased opportunity of incorporating various types of information hiding techniques into the malicious software and by that perform different types of attacks.
Pawel Rajba, Wojciech Mazurczyk
openaire   +1 more source

Obfuscation: Maze of code

2017 2nd International Conference on Communication Systems, Computing and IT Applications (CSCITA), 2017
Software Reverse Engineering scenario would involve software that has been worked upon for years and carries several modules of a business in its lines of code. Unfortunately the source code of the application has been lost, what remains is “native” or “binary” code. Traditional obfuscators work on binary code but they are tedious and do not provide us
Pratik Kanani   +4 more
openaire   +1 more source

Obfuscated Code Quality Measurement

2019 XXIX International Scientific Symposium "Metrology and Metrology Assurance" (MMA), 2019
Nowadays, number of cyber-attacks aimed at software increases. Thus, improving the quality of software security services becomes acute. Confidentiality is one of the basic security services. It is provided, including through the use of obfuscation mechanism. Code quality measurement Methods has been investigated. Particular attention is paid to methods
Serhii Semenov   +2 more
openaire   +1 more source

Home - About - Disclaimer - Privacy