Results 241 to 250 of about 30,050 (262)
Some of the next articles are maybe not open access.
UnThemida: Commercial obfuscation technique analysis with a fully obfuscated program
Software: Practice and Experience, 2018SummaryThe main goal of code obfuscation is to make software more difficult to reverse engineer. These techniques modify data structures and control flow while retaining the functionality of the original program. Although obfuscation is a useful method for protecting programs, it can also be used to protect malware.
Jae Hyuk Suk +4 more
openaire +1 more source
Stealthy code obfuscation technique for software security
The 2010 International Conference on Computer Engineering & Systems, 2010Code obfuscation, a tool converts a program into one that is functionally identical to the original but which is much more difficult for attacker to understand is currently the most viable technique for preventing malicious reverse engineering of software.
Saad M. Darwish +2 more
openaire +1 more source
A Perceptron-Inspired Technique for Hardware Obfuscation
2018 19th International Workshop on Microprocessor and SOC Test and Verification (MTV), 2018Outsourcing the manufacture of integrated circuits (IC) boosts efficiency in terms of production timeline and minimizing expenditures. However, it results in security challenges, as there is uncertainty in the reliability of the foundry that is responsible for the IC fabrication.
Siroos Madani +2 more
openaire +1 more source
Hardware Obfuscation: Techniques and Open Challenges
2017While hardware obfuscation has been used in industry for many years, very few scientific papers discuss layout-level obfuscation. The main aim of this paper is to start a discussion about hardware obfuscation in the academic community and point out open research problems. In particular, we introduce a very flexible layout-level obfuscation tool that we
Georg T. Becker +2 more
openaire +1 more source
The Quality of Obfuscation and Obfuscation Techniques
2007This paper aims an overview of the obfuscation transformations like layout, data, control, preventative and stealthy obfuscation. Software obfuscation is the common way to prevent reverse engineering. Obfuscation is one of the software secrets technique protections and in general, describes a practice that is used intentionally to make something more ...
openaire +1 more source
Obfuscated malicious javascript detection using classification techniques
2009 4th International Conference on Malicious and Unwanted Software (MALWARE), 2009As the World Wide Web expands and more users join, it becomes an increasingly attractive means of distributing malware. Malicious javascript frequently serves as the initial infection vector for malware. We train several classifiers to detect malicious javascript and evaluate their performance.
Peter Likarish, Eunjin Jung, Insoon Jo
openaire +1 more source
Data Obfuscation Techniques for Realtime Data Pipelines
Journal of Mathematical & Computer Applications, 2022Obfuscation safeguards healthcare, banking, manufacturing, and telecommunications real-time data. While prone to incursions, breaches, and attacks, real-time data pipelines acquire sensitive data and make speedy choices. Obfuscating sensitive data permits inquiry but prohibits access.
openaire +1 more source
Logic Obfuscation Technique for Securing Test Pattern Generators
2021 Second International Conference on Electronics and Sustainable Communication Systems (ICESC), 2021As the economic process of integrated circuit (IC) process proceeds, various supply chain components will copy ICs to introduce hardware Trojans, and overbuild ICs. A variety of hardware security studies have been conducted in order to prevent piracy, reverse engineering, and overbuilding through obfuscation.
P. Shanmukha Naga Naidu +5 more
openaire +1 more source
Cloud Protection by Obfuscation: Techniques and Metrics
2012 Seventh International Conference on P2P, Parallel, Grid, Cloud and Internet Computing, 2012This paper presents a survey of software protection based on the concept of security by obscurity, code obfuscation is now a hot topic in the field of digital right management, protecting against reverse engineering and tampering. Obfuscation comes in handy in situations where depending on cryptographic techniques is not enough, this is typical in ...
Muhammad Hataba, Ahmed El-Mahdy
openaire +1 more source
The malicious code hiding techniques, code obfuscation problem
2014 IEEE 12th IEEE International Conference on Emerging eLearning Technologies and Applications (ICETA), 2014Nowadays, in world of modern technologies and technology society, information can be the most valuable commodity on the market and so gathering it, buy or sell it becomes the most important part of doing business. Because of the prizing, the more sophisticated ways of gathering and processing of the information are still being developed, various kinds ...
Jan Hurtuk +3 more
openaire +1 more source

