Results 241 to 250 of about 30,050 (262)
Some of the next articles are maybe not open access.

UnThemida: Commercial obfuscation technique analysis with a fully obfuscated program

Software: Practice and Experience, 2018
SummaryThe main goal of code obfuscation is to make software more difficult to reverse engineer. These techniques modify data structures and control flow while retaining the functionality of the original program. Although obfuscation is a useful method for protecting programs, it can also be used to protect malware.
Jae Hyuk Suk   +4 more
openaire   +1 more source

Stealthy code obfuscation technique for software security

The 2010 International Conference on Computer Engineering & Systems, 2010
Code obfuscation, a tool converts a program into one that is functionally identical to the original but which is much more difficult for attacker to understand is currently the most viable technique for preventing malicious reverse engineering of software.
Saad M. Darwish   +2 more
openaire   +1 more source

A Perceptron-Inspired Technique for Hardware Obfuscation

2018 19th International Workshop on Microprocessor and SOC Test and Verification (MTV), 2018
Outsourcing the manufacture of integrated circuits (IC) boosts efficiency in terms of production timeline and minimizing expenditures. However, it results in security challenges, as there is uncertainty in the reliability of the foundry that is responsible for the IC fabrication.
Siroos Madani   +2 more
openaire   +1 more source

Hardware Obfuscation: Techniques and Open Challenges

2017
While hardware obfuscation has been used in industry for many years, very few scientific papers discuss layout-level obfuscation. The main aim of this paper is to start a discussion about hardware obfuscation in the academic community and point out open research problems. In particular, we introduce a very flexible layout-level obfuscation tool that we
Georg T. Becker   +2 more
openaire   +1 more source

The Quality of Obfuscation and Obfuscation Techniques

2007
This paper aims an overview of the obfuscation transformations like layout, data, control, preventative and stealthy obfuscation. Software obfuscation is the common way to prevent reverse engineering. Obfuscation is one of the software secrets technique protections and in general, describes a practice that is used intentionally to make something more ...
openaire   +1 more source

Obfuscated malicious javascript detection using classification techniques

2009 4th International Conference on Malicious and Unwanted Software (MALWARE), 2009
As the World Wide Web expands and more users join, it becomes an increasingly attractive means of distributing malware. Malicious javascript frequently serves as the initial infection vector for malware. We train several classifiers to detect malicious javascript and evaluate their performance.
Peter Likarish, Eunjin Jung, Insoon Jo
openaire   +1 more source

Data Obfuscation Techniques for Realtime Data Pipelines

Journal of Mathematical & Computer Applications, 2022
Obfuscation safeguards healthcare, banking, manufacturing, and telecommunications real-time data. While prone to incursions, breaches, and attacks, real-time data pipelines acquire sensitive data and make speedy choices. Obfuscating sensitive data permits inquiry but prohibits access.
openaire   +1 more source

Logic Obfuscation Technique for Securing Test Pattern Generators

2021 Second International Conference on Electronics and Sustainable Communication Systems (ICESC), 2021
As the economic process of integrated circuit (IC) process proceeds, various supply chain components will copy ICs to introduce hardware Trojans, and overbuild ICs. A variety of hardware security studies have been conducted in order to prevent piracy, reverse engineering, and overbuilding through obfuscation.
P. Shanmukha Naga Naidu   +5 more
openaire   +1 more source

Cloud Protection by Obfuscation: Techniques and Metrics

2012 Seventh International Conference on P2P, Parallel, Grid, Cloud and Internet Computing, 2012
This paper presents a survey of software protection based on the concept of security by obscurity, code obfuscation is now a hot topic in the field of digital right management, protecting against reverse engineering and tampering. Obfuscation comes in handy in situations where depending on cryptographic techniques is not enough, this is typical in ...
Muhammad Hataba, Ahmed El-Mahdy
openaire   +1 more source

The malicious code hiding techniques, code obfuscation problem

2014 IEEE 12th IEEE International Conference on Emerging eLearning Technologies and Applications (ICETA), 2014
Nowadays, in world of modern technologies and technology society, information can be the most valuable commodity on the market and so gathering it, buy or sell it becomes the most important part of doing business. Because of the prizing, the more sophisticated ways of gathering and processing of the information are still being developed, various kinds ...
Jan Hurtuk   +3 more
openaire   +1 more source

Home - About - Disclaimer - Privacy