Results 61 to 70 of about 27,012 (180)
The effectiveness of source code obfuscation: An experimental assessment [PDF]
Source code obfuscation is a protection mechanism widely used to limit the possibility of malicious reverse engineering or attack activities on a software system. Although several code obfuscation techniques and tools are available, little knowledge is available about the capability of obfuscation to reduce attackers' efficiency, and the contexts in ...
Mariano Ceccato +6 more
openaire +3 more sources
A large study on the effect of code obfuscation on the quality of java code [PDF]
Context: Obfuscation is a common technique used to protect software against malicious reverse engineering. Obfuscators manipulate the source code to make it harder to analyze and more difficult to understand for the attacker.
Boldyreff, Cornelia +7 more
core +4 more sources
Obfuscation is used to protect programs from analysis and reverse engineering. There are theoretically effective and resistant obfuscation methods, but most of them are not implemented in practice yet.
Petr D. Borisov, Yury V. Kosolapov
doaj +1 more source
Evolution and Detection of Polymorphic and Metamorphic Malwares: A Survey [PDF]
Malwares are big threat to digital world and evolving with high complexity. It can penetrate networks, steal confidential information from computers, bring down servers and can cripple infrastructures etc.
Sahay, S. K., Sharma, Ashu
core +1 more source
There are various types of Android apps, such as entertainment apps, health and fitness apps, travel apps, educational apps, business apps, and so on. Android apps can contain business logic, maintain sensitive personal information, and act as a bridge ...
Byoungchul Kim +3 more
doaj +1 more source
Vectorization, Obfuscation and P4 LLVM Tool-chain [PDF]
This thesis broadly focuses on three different areas: Loop Vectorization, Code Obfuscation, and P4LLVM compiler. The work in Loop vectorization starts with a comparison of Auto-vectorization of GCC, ICC and LLVM compilers and show their strengths and ...
Kumar, Dangeti Tharun +1 more
core
Towards experimental evaluation of code obfuscation techniques [PDF]
While many obfuscation schemes proposed, none of them satisfy any strong definition of obfuscation. Furthermore secure general-purpose obfuscation algorithms have been proven to be impossible. Nevertheless, obfuscation schemes which in practice slow down malicious reverse-engineering by obstructing code comprehension for even short periods of time are ...
Mariano Ceccato +6 more
openaire +3 more sources
Invalidating Analysis Knowledge for Code Virtualization Protection Through Partition Diversity
To protect programs from unauthorized analysis, virtualize the code based on Virtual Machine (VM) technologies is emerging as a feasible method for accomplishing code obfuscation.
Wei Wang +9 more
doaj +1 more source
Morphing engines classification by code histogram [PDF]
Morphing engines or mutation engines are exploited by metamorphic virus to change the code appearance in every new generation. The purpose of these engines is to escape from the signature-based scanner, which employs a unique string signature to detect ...
Babak Bashari Rad, +3 more
core
Code Obfuscation for the C/C++ Language
Obfuscation is the action of making something unintelligible. In software development, this action can be applied to source code or binary applications. The aim of this dissertation was to implement a tool for the obfuscation of C and C++ source code.
openaire +2 more sources

