Results 71 to 80 of about 27,012 (180)
Toward Efficient Deobfuscation via Large Language Models
Obfuscation modifies code structure to impede reverse engineering and is widely used to protect intellectual property and evade malware detection. However, existing deobfuscation techniques largely rely on analyst-driven heuristics or are tailored to ...
Byunggeon Choi +3 more
doaj +1 more source
Pure Infinitely Self-Modifying Code is Realizable and Turing-complete [PDF]
Although self-modifying code has been shyed away from due to its complexity and discouragement due to safety issues, it nevertheless provides for a very unique obfuscation method and a different perspective on the relationship between data and code.
Gregory Morse
doaj +1 more source
Language and Obfuscation Oblivious Source Code Authorship Attribution
Source Code Authorship Attribution can answer many interesting questions such as: Who wrote the malicious source code? Is the source code plagiarized, and does it infringe on copyright?
Sarim Zafar +3 more
doaj +1 more source
Classification of Obfuscation Techniques in LLVM IR: Machine Learning on Vector Representations
We present a novel methodology for classifying code obfuscation techniques in LLVM IR program embeddings. We apply isolated and layered code obfuscations to C source code using the Tigress obfuscator, compile them to LLVM IR, and convert each IR code ...
Sebastian Raubitzek +3 more
doaj +1 more source
Chaotic Compilation for Encrypted Computing: Obfuscation but Not in Name [PDF]
An `obfuscation' for encrypted computing is quantified exactly here, leading to an argument that security against polynomial-time attacks has been achieved for user data via the deliberately `chaotic' compilation required for security properties in that ...
Breuer, Peter T.
core +1 more source
An Android Malicious Code Detection Method Based on Improved DCA Algorithm
Recently, Android malicious code has increased dramatically and the technology of reinforcement is increasingly powerful. Due to the development of code obfuscation and polymorphic deformation technology, the current Android malicious code static ...
Chundong Wang +5 more
doaj +1 more source
Obfuscation is rampant in both benign and malicious JavaScript (JS) codes. It generates an obscure and undetectable code that hinders comprehension and analysis. Therefore, accurate detection of JS codes that masquerade as innocuous scripts is vital. The
Samuel Ndichu +3 more
doaj +1 more source
The method of generation program code with indistinguishable functionality
The paper presents an obfuscation problem, in which indistinguishability is considered relatively to programs with distinguishable functionality. The functionality remains undisclosed owing to unknown parameters in the program’s input.
Mikhail Andreevich Styugin
doaj +1 more source
Code obfuscation against symbolic execution attacks
Code obfuscation is widely used by software developers to protect intellectual property, and malware writers to hamper program analysis. However, there seems to be little work on systematic evaluations of effectiveness of obfuscation techniques against automated program analysis.
Sebastian Banescu +4 more
openaire +3 more sources
The Effectiveness Of Bytecode Decompilation [PDF]
High-level bytecodes used by object-oriented managed execution environments make it easy to decompile them. This paper studies the reasons that make bytecode decompilers such efficient and presents basic obfuscation techniques as an efficient protection ...
Robert Enyedi
core

