Results 51 to 60 of about 30,382 (272)

A Framework to Quantify the Quality of Source Code Obfuscation

open access: yesApplied Sciences
Malicious reverse engineering of software has served as a valuable technique for attackers to infringe upon and steal intellectual property. We can employ obfuscation techniques to protect against such attackers as useful tools to safeguard software ...
Hongjoo Jin   +4 more
doaj   +1 more source

Evaluation and classification of obfuscated Android malware through deep learning using ensemble voting mechanism

open access: yesScientific Reports, 2023
With the rise in popularity and usage of Android operating systems, malicious applications are targeted by applying innovative ways and techniques.
Sana Aurangzeb, Muhammad Aleem
doaj   +1 more source

On the Effectiveness of Perturbations in Generating Evasive Malware Variants

open access: yesIEEE Access, 2023
Malware variants are generated using various evasion techniques to bypass malware detectors, so it is important to understand what properties make them evade malware detection techniques.
Beomjin Jin   +3 more
doaj   +1 more source

Achieving Obfuscation Through Self-Modifying Code: A Theoretical Model [PDF]

open access: yes, 2020
With the extreme amount of data and software available on networks, the protection of online information is one of the most important tasks of this technological age.
Waddell, Heidi
core   +1 more source

Positive Results and Techniques for Obfuscation [PDF]

open access: yes, 2004
Informally, an obfuscator \({\mathcal{O}}\) is an efficient, probabilistic “compiler” that transforms a program P into a new program (P) with the same functionality as P, but such that \({\mathcal{O}}(P)\) protects any secrets that may be built into and used by P.
Benjamin Lynn   +2 more
openaire   +1 more source

Nanothermometry in Living Cells: Physical Limits, Conceptual and Material Challenges

open access: yesAdvanced Functional Materials, EarlyView.
Heat and temperature are fundamental to life. When nanothermometers began probing regions as small as a living cell, they triggered controversial claims of large intracellular temperature gradients. We review physical constraints energy‐conservation, entropy production, thermodynamic fluctuations, and molecular dynamics.
Taras Plakhotnik
wiley   +1 more source

Hardware and Software Methods for Secure Obfuscation and Deobfuscation: An In-Depth Analysis

open access: yesComputers
The swift evolution of information technology and growing connectivity in critical applications have elevated cybersecurity, protecting and certifying software and designs against rising cyber threats.
Khaled Saleh   +4 more
doaj   +1 more source

PowerDP: De-Obfuscating and Profiling Malicious PowerShell Commands With Multi-Label Classifiers

open access: yesIEEE Access, 2023
In recent years, PowerShell has become the common tool that helps attackers launch targeted attacks using living-off-the-land tactics and fileless attack techniques.
Meng-Han Tsai   +4 more
doaj   +1 more source

Assembly of Cell‐Seeded 3D Printed Hydrogel Modules with Perfusable Channel Networks

open access: yesAdvanced Functional Materials, EarlyView.
Macroscale assembly was utilized to prepare perfusable tissue constructs from individually 3D printed hydrogel modules with embedded branched channel networks and port arrays for cell seeding. Novel multi‐material bioreactors were fabricated to facilitate the gluing of individual modules and the perfusion culture of assembled modular constructs seeded ...
Zachary J. Geffert   +10 more
wiley   +1 more source

Conceptualising quality early childhood education: Learning from young children in Brazil and South Africa through creative and play‐based methods

open access: yesBritish Educational Research Journal, EarlyView., 2023
Abstract Early childhood has increasingly been acknowledged as a vital time for all children. Inclusive and quality education is part of the United Nations Sustainable Development Goals, with the further specification that all children have access to quality pre‐primary education.
Laura H. V. Wright   +8 more
wiley   +1 more source

Home - About - Disclaimer - Privacy