Results 81 to 90 of about 27,012 (180)
Security Assessment of Code Obfuscation Based on Dynamic Monitoring in Android Things
Android-based Internet-of-Things devices with excellent compatibility and openness are constantly emerging. A typical example is Android Things that Google supports.
Taejoo Cho, Hyunki Kim, Jeong Hyun Yi
doaj +1 more source
Eight years of rider measurement in the Android malware ecosystem: evolution and lessons learned [PDF]
Despite the growing threat posed by Android malware, the research community is still lacking a comprehensive view of common behaviors and trends exposed by malware families active on the platform.
Stringhini, Gianluca +1 more
core
An Approach to Reconstruction of Control Flow of an Obfuscated Program
Control flow obfuscation is one of widespread methods used to protect application binary code from analysis. The obfuscation transformations dramatically increase the complexity of separation and recognition of the algorithm and data structures.
Ilya N. Ledovskikh, Maxim G. Bakulin
doaj
Systemization of Pluggable Transports for Censorship Resistance [PDF]
An increasing number of countries implement Internet censorship at different scales and for a variety of reasons. In particular, the link between the censored client and entry point to the uncensored network is a frequent target of censorship due to the ...
Khattak, Sheharbano +2 more
core
Malware authors often employ code obfuscations to make their malware harder to detect. Existing tools for generating obfuscated code often require access to the original source code (e.g., C++ or Java), and adding new obfuscations is a non-trivial, labor-intensive process.
Seyedreza Mohseni +7 more
openaire +2 more sources
Code Obfuscation. Where is it Heading?
Reverse Engineering is the process of revealing hidden code from class file. It converts garbage to readable English text. The main purpose of Reverse Engineering is to uncover the hidden code when the documentation is poor, missing source file, and developer is no longer available to provide the original code source file.
Asmaa Mahfoud +4 more
openaire +2 more sources
Identifying obfuscated code through graph-based semantic analysis of binary code
Protecting sensitive program content is a critical concern in various situations, ranging from legitimate use cases to unethical contexts. Obfuscation is one of the most used techniques to ensure such a protection.
Roxane Cohen +3 more
doaj +1 more source
Hardware and Software Methods for Secure Obfuscation and Deobfuscation: An In-Depth Analysis
The swift evolution of information technology and growing connectivity in critical applications have elevated cybersecurity, protecting and certifying software and designs against rising cyber threats.
Khaled Saleh +4 more
doaj +1 more source
The Technique of Binary Code Decompilation and Its Application in Information Security Sphere
The authors describes a new technique of binary code decompilation and its application possibility in information security such as software protection against reverse engineering and code obfuscation analyze in malware.
M. O. Shudrak +2 more
doaj
Two-factor authentication (2FA) is a foundational security mechanism that significantly enhances user identity verification’s reliability. Despite the availability of various 2FA implementation methods, a considerable proportion still relies on ...
Maciej Bartlomiejczyk +2 more
doaj +1 more source

