Results 31 to 40 of about 49,594 (257)
Partial Evaluation of String Obfuscations for Java Malware Detection [PDF]
The fact that Java is platform independent gives hackers the opportunity to write exploits that can target users on any platform, which has a JVM implementation. Metasploit is a well-known source of Javaexploits and to circumvent detection by Anti Virus (
Chawdhary, Aziem +2 more
core +1 more source
Research on construction of conditional exception code used in branch obfuscation
Using conditional exception code construction and exception handler to replace conditional jump code,the branch obfuscation get the right branch selection,but the address of branch point was concealed,so this obfuscation method can defeat symbolic ...
Pu GENG, Yuefei ZHU
doaj +3 more sources
Partial Evaluation for Java Malware Detection [PDF]
The fact that Java is platform independent gives hackers the opportunity to write exploits that can target users on any platform, which has a JVM implementation. Metasploit is a well-known source of Java exploits and to circumvent detection by Anti Virus
A Flexeder +6 more
core +1 more source
Trust and obfuscation principles for quality of information in emerging pervasive environments [PDF]
Non peer ...
Bisdikian, Chatschik +3 more
core +1 more source
Despite the recent advances in the theory underlying obfuscation, there still is a need to evaluate the quality of practical obfuscating transformations more quickly and easily. This paper presents the first steps toward a comprehensive evaluation suite consisting of a number of deobfuscating transformations and complexity metrics that can be readily ...
Anckaert, Bertrand +5 more
openaire +2 more sources
Research on deception defense techniques based on network characteristics obfuscation
There is usually a reconnaissance stage before a network attack, the attacker obtains the key information of the target system through techniques such as traffic analysis and active scanning, to formulate a targeted network attack.
ZHAO Jinlong, ZHANG Guomin, XING Changyou
doaj +3 more sources
Hybrid Obfuscation Using Signals and Encryption
Obfuscation of software and data is one of the subcategories of software security. Hence, the outlines of the obfuscation problem and its various methods have been studied in this article.
Bahare Hashemzade, Ali Maroosi
doaj +1 more source
Privacy Games: Optimal User-Centric Data Obfuscation
In this paper, we design user-centric obfuscation mechanisms that impose the minimum utility loss for guaranteeing user's privacy. We optimize utility subject to a joint guarantee of differential privacy (indistinguishability) and distortion privacy ...
Shokri, Reza
core +2 more sources
Protecting Private Attributes in App Based Mobile User Profiling
The Analytics companies enable successful targeted advertising via user profiles, derived from the mobile apps installed by specific users, and hence have become an integral part of the mobile advertising industry. This threatens the users' privacy, when
Imdad Ullah +5 more
doaj +1 more source
Research on the Construction of Malware Variant Datasets and Their Detection Method
Malware detection is of great significance for maintaining the security of information systems. Malware obfuscation techniques and malware variants are increasingly emerging, but their samples and API (application programming interface) sequences are ...
Faming Lu +4 more
doaj +1 more source

