Results 1 to 10 of about 30,382 (272)

MalFormer: A Novel Vision Transformer Model for Robust Malware Analysis

open access: yesIEEE Access
As traditional signature-based malware analysis struggles to detect malware variants, image-based malware analysis has been researched to overcome these limitations.
In-Woong Jeong   +3 more
doaj   +1 more source

A Survey on Program Code Obfuscation Technique

open access: yesEngineering and Technology Journal, 2016
Program code are distributed through internet and suffering from the program theft. Means a program is sold to user and user make own copyright of program called program theft. This is happen because program are easily decomposed into reusable class file and also decomposed into source code by the program users.
openaire   +1 more source

Code Obfuscation: A Comprehensive Approach to Detection, Classification, and Ethical Challenges

open access: yesAlgorithms
Code obfuscation has become an essential practice in modern software development, designed to make source or machine code challenging for both humans and computers to comprehend.
Tomer Raitsis   +5 more
doaj   +1 more source

Incorporating contextual factors in agri-environmental research – options for obfuscation to support wider data application

open access: yesIrish Journal of Agricultural and Food Research
Geoprivacy protection is a significant concern when sharing agricultural data with geographical information. Open and transparent access to agricultural data is essential to optimise its use, as well as integration with other data sources, such as ...
P. Nowbakht   +3 more
doaj   +1 more source

Classification of Obfuscation Techniques in LLVM IR: Machine Learning on Vector Representations

open access: yesMachine Learning and Knowledge Extraction
We present a novel methodology for classifying code obfuscation techniques in LLVM IR program embeddings. We apply isolated and layered code obfuscations to C source code using the Tigress obfuscator, compile them to LLVM IR, and convert each IR code ...
Sebastian Raubitzek   +3 more
doaj   +1 more source

Adaptive Hybrid Obfuscation for Privacy-Preserved Data in Machine Learning Intrusion Detection Systems

open access: yesIEEE Access
Intrusion Detection Systems (IDSs) are often used to monitor and protect computer networks and they usually rely on highly sensitive network traffic data which can sometimes lead to exposure of private information or even serious system breaches if it is
Sana Mourad, Mohammad Alnabhan
doaj   +1 more source

An Alternative Approach to Data Carving Portable Document Format (PDF) Files

open access: yesJournal of Cybersecurity Education, Research & Practice
Traditional data carving relies on the successful identification of headers and trailers, unique hexadecimal signatures which are exclusive to specific file types.
Kevin Hughes, Michael Black
doaj  

Home - About - Disclaimer - Privacy