Results 81 to 90 of about 27,012 (180)

Security Assessment of Code Obfuscation Based on Dynamic Monitoring in Android Things

open access: yesIEEE Access, 2017
Android-based Internet-of-Things devices with excellent compatibility and openness are constantly emerging. A typical example is Android Things that Google supports.
Taejoo Cho, Hyunki Kim, Jeong Hyun Yi
doaj   +1 more source

Eight years of rider measurement in the Android malware ecosystem: evolution and lessons learned [PDF]

open access: yes, 2018
Despite the growing threat posed by Android malware, the research community is still lacking a comprehensive view of common behaviors and trends exposed by malware families active on the platform.
Stringhini, Gianluca   +1 more
core  

An Approach to Reconstruction of Control Flow of an Obfuscated Program

open access: yesТруды Института системного программирования РАН, 2018
Control flow obfuscation is one of widespread methods used to protect application binary code from analysis. The obfuscation transformations dramatically increase the complexity of separation and recognition of the algorithm and data structures.
Ilya N. Ledovskikh, Maxim G. Bakulin
doaj  

Systemization of Pluggable Transports for Censorship Resistance [PDF]

open access: yes, 2016
An increasing number of countries implement Internet censorship at different scales and for a variety of reasons. In particular, the link between the censored client and entry point to the uncensored network is a frequent target of censorship due to the ...
Khattak, Sheharbano   +2 more
core  

Can LLMs Obfuscate Code? A Systematic Analysis of Large Language Models into Assembly Code Obfuscation

open access: yesProceedings of the AAAI Conference on Artificial Intelligence
Malware authors often employ code obfuscations to make their malware harder to detect. Existing tools for generating obfuscated code often require access to the original source code (e.g., C++ or Java), and adding new obfuscations is a non-trivial, labor-intensive process.
Seyedreza Mohseni   +7 more
openaire   +2 more sources

Code Obfuscation. Where is it Heading?

open access: yesInternational Journal of Engineering & Technology, 2018
Reverse Engineering is the process of revealing hidden code from class file. It converts garbage to readable English text. The main purpose of Reverse Engineering is to uncover the hidden code when the documentation is poor, missing source file, and developer is no longer available to provide the original code source file.
Asmaa Mahfoud   +4 more
openaire   +2 more sources

Identifying obfuscated code through graph-based semantic analysis of binary code

open access: yesApplied Network Science
Protecting sensitive program content is a critical concern in various situations, ranging from legitimate use cases to unethical contexts. Obfuscation is one of the most used techniques to ensure such a protection.
Roxane Cohen   +3 more
doaj   +1 more source

Hardware and Software Methods for Secure Obfuscation and Deobfuscation: An In-Depth Analysis

open access: yesComputers
The swift evolution of information technology and growing connectivity in critical applications have elevated cybersecurity, protecting and certifying software and designs against rising cyber threats.
Khaled Saleh   +4 more
doaj   +1 more source

The Technique of Binary Code Decompilation and Its Application in Information Security Sphere

open access: yesБезопасность информационных технологий, 2012
The authors describes a new technique of binary code decompilation and its application possibility in information security such as software protection against reverse engineering and code obfuscation analyze in malware.
M. O. Shudrak   +2 more
doaj  

Enhancing Two-Factor Authentication Security by Analyzing and Detecting SMS OTP-Interception Techniques in Android Malware

open access: yesIEEE Access
Two-factor authentication (2FA) is a foundational security mechanism that significantly enhances user identity verification’s reliability. Despite the availability of various 2FA implementation methods, a considerable proportion still relies on ...
Maciej Bartlomiejczyk   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy