Results 11 to 20 of about 30,382 (272)
Assessment of Source Code Obfuscation Techniques [PDF]
Obfuscation techniques are a general category of software protections widely adopted to prevent malicious tampering of the code by making applications more difficult to understand and thus harder to modify.
Leonardo Regano +2 more
exaly +6 more sources
On the evaluation of android malware detectors against code-obfuscation techniques [PDF]
The Android mobile platform is the most popular and dominates the cell phone market. With the increasing use of Android, malware developers have become active in circumventing security measures by using various obfuscation techniques.
Umair Nawaz +2 more
doaj +3 more sources
Layered obfuscation: a taxonomy of software obfuscation techniques for layered security [PDF]
Software obfuscation has been developed for over 30 years. A problem always confusing the communities is what security strength the technique can achieve.
Hui Xu +3 more
doaj +2 more sources
Different Obfuscation Techniques for Code Protection
AbstractWith the advancements in digital technology, the threat of unimaginable level of duplicating and illegal reproducing of software also increases. Therefore the piracy rate is increasing proportionally. This scenario has clearly placed the threat for the software manufacturers and leads to the development of numerous software protection ...
Chandan Kumar Behera, D Lalitha Bhaskari
exaly +2 more sources
Geospatial Imprecision With Constraints for Precision Public Health: Algorithm Development and Validation [PDF]
BackgroundLocation and environmental social determinants of health are increasingly important factors in both an individual’s health and the monitoring of community-level public health issues.
Daniel Harris, Chris Delcher
doaj +2 more sources
An Overview of FPGA-inspired Obfuscation Techniques
Building and maintaining a silicon foundry is a costly endeavor that requires substantial financial investment. From this scenario, the semiconductor business has largely shifted to a fabless model where the Integrated Circuit (IC) supply chain is globalized but potentially untrusted.
Zain Ul Abideen +2 more
exaly +3 more sources
As augmented reality (AR) technologies become increasingly integrated into everyday life, privacy-maintenance concerns about their capacity to capture and process sensitive visual data also increase.
Ana Cassia Cruz +5 more
doaj +3 more sources
Research on deception defense techniques based on network characteristics obfuscation
There is usually a reconnaissance stage before a network attack, the attacker obtains the key information of the target system through techniques such as traffic analysis and active scanning, to formulate a targeted network attack.
ZHAO Jinlong, ZHANG Guomin, XING Changyou
doaj +3 more sources
Measuring Software Obfuscation Quality–A Systematic Literature Review
Software obfuscation techniques are increasingly being used to prevent attackers from exploiting security flaws and launching successful attacks. With research on software obfuscation techniques rapidly growing, many software obfuscation techniques with ...
Shouki A. Ebad +2 more
doaj +1 more source
Evaluation of Survivability of the Automatically Obfuscated Android Malware
Malware is a growing threat to all mobile platforms and hundreds of new malicious applications are being detected every day. At the same time, the development of automated software obfuscation techniques allows for the easy production of new malware ...
Himanshu Patel +9 more
doaj +1 more source

