Results 61 to 70 of about 27,012 (180)

The effectiveness of source code obfuscation: An experimental assessment [PDF]

open access: yes2009 IEEE 17th International Conference on Program Comprehension, 2009
Source code obfuscation is a protection mechanism widely used to limit the possibility of malicious reverse engineering or attack activities on a software system. Although several code obfuscation techniques and tools are available, little knowledge is available about the capability of obfuscation to reduce attackers' efficiency, and the contexts in ...
Mariano Ceccato   +6 more
openaire   +3 more sources

A large study on the effect of code obfuscation on the quality of java code [PDF]

open access: yes, 2014
Context: Obfuscation is a common technique used to protect software against malicious reverse engineering. Obfuscators manipulate the source code to make it harder to analyze and more difficult to understand for the attacker.
Boldyreff, Cornelia   +7 more
core   +4 more sources

On Characteristics of Symbolic Execution in the Problem of Assessing the Quality of Obfuscating Transformations

open access: yesМоделирование и анализ информационных систем, 2021
Obfuscation is used to protect programs from analysis and reverse engineering. There are theoretically effective and resistant obfuscation methods, but most of them are not implemented in practice yet.
Petr D. Borisov, Yury V. Kosolapov
doaj   +1 more source

Evolution and Detection of Polymorphic and Metamorphic Malwares: A Survey [PDF]

open access: yes, 2015
Malwares are big threat to digital world and evolving with high complexity. It can penetrate networks, steal confidential information from computers, bring down servers and can cripple infrastructures etc.
Sahay, S. K., Sharma, Ashu
core   +1 more source

RomaDroid: A Robust and Efficient Technique for Detecting Android App Clones Using a Tree Structure and Components of Each App’s Manifest File

open access: yesIEEE Access, 2019
There are various types of Android apps, such as entertainment apps, health and fitness apps, travel apps, educational apps, business apps, and so on. Android apps can contain business logic, maintain sensitive personal information, and act as a bridge ...
Byoungchul Kim   +3 more
doaj   +1 more source

Vectorization, Obfuscation and P4 LLVM Tool-chain [PDF]

open access: yes, 2018
This thesis broadly focuses on three different areas: Loop Vectorization, Code Obfuscation, and P4LLVM compiler. The work in Loop vectorization starts with a comparison of Auto-vectorization of GCC, ICC and LLVM compilers and show their strengths and ...
Kumar, Dangeti Tharun   +1 more
core  

Towards experimental evaluation of code obfuscation techniques [PDF]

open access: yesProceedings of the 4th ACM workshop on Quality of protection, 2008
While many obfuscation schemes proposed, none of them satisfy any strong definition of obfuscation. Furthermore secure general-purpose obfuscation algorithms have been proven to be impossible. Nevertheless, obfuscation schemes which in practice slow down malicious reverse-engineering by obstructing code comprehension for even short periods of time are ...
Mariano Ceccato   +6 more
openaire   +3 more sources

Invalidating Analysis Knowledge for Code Virtualization Protection Through Partition Diversity

open access: yesIEEE Access, 2019
To protect programs from unauthorized analysis, virtualize the code based on Virtual Machine (VM) technologies is emerging as a feasible method for accomplishing code obfuscation.
Wei Wang   +9 more
doaj   +1 more source

Morphing engines classification by code histogram [PDF]

open access: yes, 2011
Morphing engines or mutation engines are exploited by metamorphic virus to change the code appearance in every new generation. The purpose of these engines is to escape from the signature-based scanner, which employs a unique string signature to detect ...
Babak Bashari Rad,   +3 more
core  

Code Obfuscation for the C/C++ Language

open access: yesCoRR, 2020
Obfuscation is the action of making something unintelligible. In software development, this action can be applied to source code or binary applications. The aim of this dissertation was to implement a tool for the obfuscation of C and C++ source code.
openaire   +2 more sources

Home - About - Disclaimer - Privacy