MalFormer: A Novel Vision Transformer Model for Robust Malware Analysis
As traditional signature-based malware analysis struggles to detect malware variants, image-based malware analysis has been researched to overcome these limitations.
In-Woong Jeong +3 more
doaj +1 more source
A Survey on Program Code Obfuscation Technique
Program code are distributed through internet and suffering from the program theft. Means a program is sold to user and user make own copyright of program called program theft. This is happen because program are easily decomposed into reusable class file and also decomposed into source code by the program users.
openaire +1 more source
Code Obfuscation: A Comprehensive Approach to Detection, Classification, and Ethical Challenges
Code obfuscation has become an essential practice in modern software development, designed to make source or machine code challenging for both humans and computers to comprehend.
Tomer Raitsis +5 more
doaj +1 more source
Geoprivacy protection is a significant concern when sharing agricultural data with geographical information. Open and transparent access to agricultural data is essential to optimise its use, as well as integration with other data sources, such as ...
P. Nowbakht +3 more
doaj +1 more source
Classification of Obfuscation Techniques in LLVM IR: Machine Learning on Vector Representations
We present a novel methodology for classifying code obfuscation techniques in LLVM IR program embeddings. We apply isolated and layered code obfuscations to C source code using the Tigress obfuscator, compile them to LLVM IR, and convert each IR code ...
Sebastian Raubitzek +3 more
doaj +1 more source
Intrusion Detection Systems (IDSs) are often used to monitor and protect computer networks and they usually rely on highly sensitive network traffic data which can sometimes lead to exposure of private information or even serious system breaches if it is
Sana Mourad, Mohammad Alnabhan
doaj +1 more source
An Alternative Approach to Data Carving Portable Document Format (PDF) Files
Traditional data carving relies on the successful identification of headers and trailers, unique hexadecimal signatures which are exclusive to specific file types.
Kevin Hughes, Michael Black
doaj
A privacy-preserving multi-user retrieval system for multimodal artificial intelligence. [PDF]
Gao Y +5 more
europepmc +1 more source
A User-Centric Context-Aware Framework for Real-Time Optimisation of Multimedia Data Privacy Protection, and Information Retention Within Multimodal AI Systems. [PDF]
Topalli N, Badii A.
europepmc +1 more source
Tunnel enabled programmable switches obfuscate network topology to defend against link flooding reconnaissance in software defined networking. [PDF]
Li X, Lee J, Son J, Lee Y.
europepmc +1 more source

