Results 11 to 20 of about 30,382 (272)

Assessment of Source Code Obfuscation Techniques [PDF]

open access: yes2016 IEEE 16th International Working Conference on Source Code Analysis and Manipulation (SCAM), 2016
Obfuscation techniques are a general category of software protections widely adopted to prevent malicious tampering of the code by making applications more difficult to understand and thus harder to modify.
Leonardo Regano   +2 more
exaly   +6 more sources

On the evaluation of android malware detectors against code-obfuscation techniques [PDF]

open access: yesPeerJ Computer Science, 2022
The Android mobile platform is the most popular and dominates the cell phone market. With the increasing use of Android, malware developers have become active in circumventing security measures by using various obfuscation techniques.
Umair Nawaz   +2 more
doaj   +3 more sources

Layered obfuscation: a taxonomy of software obfuscation techniques for layered security [PDF]

open access: yesCybersecurity, 2020
Software obfuscation has been developed for over 30 years. A problem always confusing the communities is what security strength the technique can achieve.
Hui Xu   +3 more
doaj   +2 more sources

Different Obfuscation Techniques for Code Protection

open access: yesProcedia Computer Science, 2015
AbstractWith the advancements in digital technology, the threat of unimaginable level of duplicating and illegal reproducing of software also increases. Therefore the piracy rate is increasing proportionally. This scenario has clearly placed the threat for the software manufacturers and leads to the development of numerous software protection ...
Chandan Kumar Behera, D Lalitha Bhaskari
exaly   +2 more sources

Geospatial Imprecision With Constraints for Precision Public Health: Algorithm Development and Validation [PDF]

open access: yesOnline Journal of Public Health Informatics
BackgroundLocation and environmental social determinants of health are increasingly important factors in both an individual’s health and the monitoring of community-level public health issues.
Daniel Harris, Chris Delcher
doaj   +2 more sources

An Overview of FPGA-inspired Obfuscation Techniques

open access: yesACM Computing Surveys
Building and maintaining a silicon foundry is a costly endeavor that requires substantial financial investment. From this scenario, the semiconductor business has largely shifted to a fabless model where the Integrated Circuit (IC) supply chain is globalized but potentially untrusted.
Zain Ul Abideen   +2 more
exaly   +3 more sources

Assessing User Perceptions and Preferences on Applying Obfuscation Techniques for Privacy Protection in Augmented Reality

open access: yesFuture Internet
As augmented reality (AR) technologies become increasingly integrated into everyday life, privacy-maintenance concerns about their capacity to capture and process sensitive visual data also increase.
Ana Cassia Cruz   +5 more
doaj   +3 more sources

Research on deception defense techniques based on network characteristics obfuscation

open access: yes网络与信息安全学报, 2021
There is usually a reconnaissance stage before a network attack, the attacker obtains the key information of the target system through techniques such as traffic analysis and active scanning, to formulate a targeted network attack.
ZHAO Jinlong, ZHANG Guomin, XING Changyou
doaj   +3 more sources

Measuring Software Obfuscation Quality–A Systematic Literature Review

open access: yesIEEE Access, 2021
Software obfuscation techniques are increasingly being used to prevent attackers from exploiting security flaws and launching successful attacks. With research on software obfuscation techniques rapidly growing, many software obfuscation techniques with ...
Shouki A. Ebad   +2 more
doaj   +1 more source

Evaluation of Survivability of the Automatically Obfuscated Android Malware

open access: yesApplied Sciences, 2022
Malware is a growing threat to all mobile platforms and hundreds of new malicious applications are being detected every day. At the same time, the development of automated software obfuscation techniques allows for the easy production of new malware ...
Himanshu Patel   +9 more
doaj   +1 more source

Home - About - Disclaimer - Privacy