Results 251 to 260 of about 30,050 (262)
Some of the next articles are maybe not open access.

Technique of Code Obfuscation Based on Class Splitting

Applied Mechanics and Materials, 2012
The security of software is threatened by piracy, tampering and reverse engineering. Attackers attempt to get important algorithms and sensitive data of software by static analysis or reverse engineering. Software protection becomes an important problem.
Yong Yong Sun, Guang Qiu Huang
openaire   +1 more source

Analysis on Technique for Code Obfuscation

Proceedings of the 2023 2nd International Conference on Networks, Communications and Information Technology, 2023
Ni Zhang   +4 more
openaire   +1 more source

Evolution of macro VBA obfuscation techniques

2022 15th International Conference on Security of Information and Networks (SIN), 2022
Silviu-Constantin Vitel   +3 more
openaire   +1 more source

Evaluation of Hardware Obfuscation Techniques using Obfuscation Tool oLLVM

IEEJ Transactions on Industry Applications, 2019
Yuumi Matsuoka   +2 more
openaire   +1 more source

Security Analysis of Scan Obfuscation Techniques

IEEE Transactions on Information Forensics and Security, 2023
Yogendra Sao, Sk. Subidh Ali
openaire   +1 more source

Source Code Obfuscation: Novel Technique and Implementation

2022
Krishna Yadav   +4 more
openaire   +1 more source

Challenge of Malware Analysis: Malware obfuscation Techniques

It is a big concern to provide the security to computer system against malware. Every day millions of malware are being created and the worse thing is that new malware is highly sophisticated which are very difficult to detect. Because the malware developers use the various obfuscation techniques to hide the actual code or the behaviour of malware ...
SİNGH, Jagsir, SİNGH, Jaswinder
openaire   +1 more source

Hybrid Obfuscation Technique for Reverse Engineering Problems

Journal of Computer Science & Computational Mathematics, 2020
Asma’a Mahfoud   +4 more
openaire   +1 more source

A Survey on Java Program Obfuscation Techniques

Chinese Journal of Computers, 2011
Jian-Min WANG   +3 more
openaire   +1 more source

Home - About - Disclaimer - Privacy