Results 31 to 40 of about 30,050 (262)
Impact of Code Deobfuscation and Feature Interaction in Android Malware Detection
With more than three million applications already in the Android marketplace, various malware detection systems based on machine learning have been proposed to prevent attacks from cybercriminals; most of these systems use static analyses to extract ...
Yun-Chung Chen +4 more
doaj +1 more source
A Comprehensive Analysis of Software Obfuscation Techniques
In today's environment, a huge and increasing range of unauthorised practises allows hackers to get unauthorised access to devices and private information by inserting harmful code. The purpose of this research is to assess the efficiency of obfuscation strategies in safeguarding software against reverse engineering and tampering.
null Priyanka Kadam +2 more
openaire +1 more source
The current state of art in program obfuscations:definitions of obfuscation security
Program obfuscation is a semantic-preserving transformation aimed at bringing a program into such a form, which impedes the understanding of its algorithm and data structures or prevents extracting of some valuable information from the text of a program.
N. P. Varnovsky +3 more
doaj +1 more source
Detection of Obfuscated Malicious JavaScript Code
Websites on the Internet are becoming increasingly vulnerable to malicious JavaScript code because of its strong impact and dramatic effect. Numerous recent cyberattacks use JavaScript vulnerabilities, and in some cases employ obfuscation to conceal ...
Ammar Alazab +3 more
doaj +1 more source
Abstract Early childhood has increasingly been acknowledged as a vital time for all children. Inclusive and quality education is part of the United Nations Sustainable Development Goals, with the further specification that all children have access to quality pre‐primary education.
Laura H. V. Wright +8 more
wiley +1 more source
You are your Metadata: Identification and Obfuscation of Social Media Users using Metadata Information [PDF]
Metadata are associated to most of the information we produce in our daily interactions and communication in the digital world. Yet, surprisingly, metadata are often still catergorized as non-sensitive.
Musolesi, Mirco +2 more
core +2 more sources
Enhanced Obfuscation Technique for Data Confidentiality in Public Cloud Storage
With an advent of cloud computing, data storage has become a boon in information technology. At the same time, data storage in remote places have become important issues. Lot of techniques are available to ensure protection of data confidentiality. These
Oli S. Arul, Arockiam L.
doaj +1 more source
PDF-Malware Detection: A Survey and Taxonomy of Current Techniques [PDF]
Portable Document Format, more commonly known as PDF, has become, in the last 20 years, a standard for document exchange and dissemination due its portable nature and widespread adoption. The flexibility and power of this format are not only leveraged by
Aniello, L. +3 more
core +1 more source
A Framework to Quantify the Quality of Source Code Obfuscation
Malicious reverse engineering of software has served as a valuable technique for attackers to infringe upon and steal intellectual property. We can employ obfuscation techniques to protect against such attackers as useful tools to safeguard software ...
Hongjoo Jin +4 more
doaj +1 more source
Trust and obfuscation principles for quality of information in emerging pervasive environments [PDF]
Non peer ...
Bisdikian, Chatschik +3 more
core +1 more source

