Results 51 to 60 of about 30,382 (272)
A Framework to Quantify the Quality of Source Code Obfuscation
Malicious reverse engineering of software has served as a valuable technique for attackers to infringe upon and steal intellectual property. We can employ obfuscation techniques to protect against such attackers as useful tools to safeguard software ...
Hongjoo Jin +4 more
doaj +1 more source
With the rise in popularity and usage of Android operating systems, malicious applications are targeted by applying innovative ways and techniques.
Sana Aurangzeb, Muhammad Aleem
doaj +1 more source
On the Effectiveness of Perturbations in Generating Evasive Malware Variants
Malware variants are generated using various evasion techniques to bypass malware detectors, so it is important to understand what properties make them evade malware detection techniques.
Beomjin Jin +3 more
doaj +1 more source
Achieving Obfuscation Through Self-Modifying Code: A Theoretical Model [PDF]
With the extreme amount of data and software available on networks, the protection of online information is one of the most important tasks of this technological age.
Waddell, Heidi
core +1 more source
Positive Results and Techniques for Obfuscation [PDF]
Informally, an obfuscator \({\mathcal{O}}\) is an efficient, probabilistic “compiler” that transforms a program P into a new program (P) with the same functionality as P, but such that \({\mathcal{O}}(P)\) protects any secrets that may be built into and used by P.
Benjamin Lynn +2 more
openaire +1 more source
Nanothermometry in Living Cells: Physical Limits, Conceptual and Material Challenges
Heat and temperature are fundamental to life. When nanothermometers began probing regions as small as a living cell, they triggered controversial claims of large intracellular temperature gradients. We review physical constraints energy‐conservation, entropy production, thermodynamic fluctuations, and molecular dynamics.
Taras Plakhotnik
wiley +1 more source
Hardware and Software Methods for Secure Obfuscation and Deobfuscation: An In-Depth Analysis
The swift evolution of information technology and growing connectivity in critical applications have elevated cybersecurity, protecting and certifying software and designs against rising cyber threats.
Khaled Saleh +4 more
doaj +1 more source
PowerDP: De-Obfuscating and Profiling Malicious PowerShell Commands With Multi-Label Classifiers
In recent years, PowerShell has become the common tool that helps attackers launch targeted attacks using living-off-the-land tactics and fileless attack techniques.
Meng-Han Tsai +4 more
doaj +1 more source
Assembly of Cell‐Seeded 3D Printed Hydrogel Modules with Perfusable Channel Networks
Macroscale assembly was utilized to prepare perfusable tissue constructs from individually 3D printed hydrogel modules with embedded branched channel networks and port arrays for cell seeding. Novel multi‐material bioreactors were fabricated to facilitate the gluing of individual modules and the perfusion culture of assembled modular constructs seeded ...
Zachary J. Geffert +10 more
wiley +1 more source
Abstract Early childhood has increasingly been acknowledged as a vital time for all children. Inclusive and quality education is part of the United Nations Sustainable Development Goals, with the further specification that all children have access to quality pre‐primary education.
Laura H. V. Wright +8 more
wiley +1 more source

