On the evaluation of android malware detectors against code-obfuscation techniques [PDF]
The Android mobile platform is the most popular and dominates the cell phone market. With the increasing use of Android, malware developers have become active in circumventing security measures by using various obfuscation techniques.
Umair Nawaz +2 more
doaj +3 more sources
Geospatial Imprecision With Constraints for Precision Public Health: Algorithm Development and Validation [PDF]
BackgroundLocation and environmental social determinants of health are increasingly important factors in both an individual’s health and the monitoring of community-level public health issues.
Daniel Harris, Chris Delcher
doaj +2 more sources
Research on deception defense techniques based on network characteristics obfuscation
There is usually a reconnaissance stage before a network attack, the attacker obtains the key information of the target system through techniques such as traffic analysis and active scanning, to formulate a targeted network attack.
ZHAO Jinlong, ZHANG Guomin, XING Changyou
doaj +3 more sources
Measuring Software Obfuscation Quality–A Systematic Literature Review
Software obfuscation techniques are increasingly being used to prevent attackers from exploiting security flaws and launching successful attacks. With research on software obfuscation techniques rapidly growing, many software obfuscation techniques with ...
Shouki A. Ebad +2 more
doaj +1 more source
Evaluation of Survivability of the Automatically Obfuscated Android Malware
Malware is a growing threat to all mobile platforms and hundreds of new malicious applications are being detected every day. At the same time, the development of automated software obfuscation techniques allows for the easy production of new malware ...
Himanshu Patel +9 more
doaj +1 more source
With the increasing complexity of software functions and the evolving technologies of network attacks, malicious behaviors such as software piracy, software cracking, data leakage, and malicious software modification are on the rise.As a result, software
Qingfeng WANG, Hao LIANG, Yawen WANG, Genlin XIE, Benwei HE
doaj +3 more sources
APIASO: A Novel API Call Obfuscation Technique Based on Address Space Obscurity
API calls are programming interfaces used by applications. When it is difficult for an analyst to perform a direct reverse analysis of a program, the API provides an important basis for analyzing the behavior and functionality of the program. API address
Yang Li +5 more
doaj +1 more source
Metrics for code obfuscation based on symbolic execution and N-scope complexity
Code obfuscation has been well developed as mitigated endogenous security technology, to effectively resist MATE attacks (e.g.reverse engineering).And it also has important value for the reasonable metrics of code obfuscation effect.Since symbolic ...
Yuqiang XIAO, Yunfei GUO, Yawen WANG
doaj +3 more sources
The rise of obfuscated Android malware and impacts on detection methods [PDF]
The various application markets are facing an exponential growth of Android malware. Every day, thousands of new Android malware applications emerge. Android malware hackers adopt reverse engineering and repackage benign applications with their malicious
Wael F. Elsersy +2 more
doaj +2 more sources
Layered obfuscation: a taxonomy of software obfuscation techniques for layered security
Software obfuscation has been developed for over 30 years. A problem always confusing the communities is what security strength the technique can achieve.
Hui Xu +3 more
doaj +1 more source

