Results 1 to 10 of about 30,035 (114)

On the evaluation of android malware detectors against code-obfuscation techniques [PDF]

open access: yesPeerJ Computer Science, 2022
The Android mobile platform is the most popular and dominates the cell phone market. With the increasing use of Android, malware developers have become active in circumventing security measures by using various obfuscation techniques.
Umair Nawaz   +2 more
doaj   +3 more sources

Geospatial Imprecision With Constraints for Precision Public Health: Algorithm Development and Validation [PDF]

open access: yesOnline Journal of Public Health Informatics
BackgroundLocation and environmental social determinants of health are increasingly important factors in both an individual’s health and the monitoring of community-level public health issues.
Daniel Harris, Chris Delcher
doaj   +2 more sources

Research on deception defense techniques based on network characteristics obfuscation

open access: yes网络与信息安全学报, 2021
There is usually a reconnaissance stage before a network attack, the attacker obtains the key information of the target system through techniques such as traffic analysis and active scanning, to formulate a targeted network attack.
ZHAO Jinlong, ZHANG Guomin, XING Changyou
doaj   +3 more sources

Measuring Software Obfuscation Quality–A Systematic Literature Review

open access: yesIEEE Access, 2021
Software obfuscation techniques are increasingly being used to prevent attackers from exploiting security flaws and launching successful attacks. With research on software obfuscation techniques rapidly growing, many software obfuscation techniques with ...
Shouki A. Ebad   +2 more
doaj   +1 more source

Evaluation of Survivability of the Automatically Obfuscated Android Malware

open access: yesApplied Sciences, 2022
Malware is a growing threat to all mobile platforms and hundreds of new malicious applications are being detected every day. At the same time, the development of automated software obfuscation techniques allows for the easy production of new malware ...
Himanshu Patel   +9 more
doaj   +1 more source

Constructing method of opaque predicate based on type conversion and operation of floating point numbers

open access: yes网络与信息安全学报, 2023
With the increasing complexity of software functions and the evolving technologies of network attacks, malicious behaviors such as software piracy, software cracking, data leakage, and malicious software modification are on the rise.As a result, software
Qingfeng WANG, Hao LIANG, Yawen WANG, Genlin XIE, Benwei HE
doaj   +3 more sources

APIASO: A Novel API Call Obfuscation Technique Based on Address Space Obscurity

open access: yesApplied Sciences, 2023
API calls are programming interfaces used by applications. When it is difficult for an analyst to perform a direct reverse analysis of a program, the API provides an important basis for analyzing the behavior and functionality of the program. API address
Yang Li   +5 more
doaj   +1 more source

Metrics for code obfuscation based on symbolic execution and N-scope complexity

open access: yes网络与信息安全学报, 2022
Code obfuscation has been well developed as mitigated endogenous security technology, to effectively resist MATE attacks (e.g.reverse engineering).And it also has important value for the reasonable metrics of code obfuscation effect.Since symbolic ...
Yuqiang XIAO, Yunfei GUO, Yawen WANG
doaj   +3 more sources

The rise of obfuscated Android malware and impacts on detection methods [PDF]

open access: yesPeerJ Computer Science, 2022
The various application markets are facing an exponential growth of Android malware. Every day, thousands of new Android malware applications emerge. Android malware hackers adopt reverse engineering and repackage benign applications with their malicious
Wael F. Elsersy   +2 more
doaj   +2 more sources

Layered obfuscation: a taxonomy of software obfuscation techniques for layered security

open access: yesCybersecurity, 2020
Software obfuscation has been developed for over 30 years. A problem always confusing the communities is what security strength the technique can achieve.
Hui Xu   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy