Results 1 to 10 of about 189,996 (174)
Stealthy Opaque Predicates in Hardware - Obfuscating Constant Expressions at Negligible Overhead [PDF]
Opaque predicates are a well-established fundamental building block for software obfuscation. Simplified, an opaque predicate implements an expression that provides constant Boolean output, but appears to have dynamic behavior for static analysis.
Max Hoffmann, Christof Paar
doaj +5 more sources
Opaque Predicates Detection by Abstract Interpretation [PDF]
Code obfuscation and software watermarking are well known techniques designed to prevent the illegal reuse of software. Code obfuscation prevents malicious reverse engineering, while software watermarking protects code from piracy. An interesting class of algorithms for code obfuscation and software watermarking relies on the insertion of opaque ...
DALLA PREDA, Mila +3 more
core +6 more sources
Defeating Opaque Predicates Statically through Machine Learning and Binary Analysis [PDF]
We present a new approach that bridges binary analysis techniques with machine learning classification for the purpose of providing a static and generic evaluation technique for opaque predicates, regardless of their constructions. We use this technique as a static automated deobfuscation tool to remove the opaque predicates introduced by obfuscation ...
Tofighi-Shirazi, Ramtine +3 more
openaire +4 more sources
A Heuristic Approach to Detect Opaque Predicates that Disrupt Static Disassembly
—Opaque predicates are used to perform code obfuscation by injecting superfluous branches into the program. Superfluous branches are the gateways for junk bytes or un-reachable code to inconspicuously mingle with authentic code instructions. In this paper,
Yu-Jye Tung, Ian G. Harris
openaire +2 more sources
With the increasing complexity of software functions and the evolving technologies of network attacks, malicious behaviors such as software piracy, software cracking, data leakage, and malicious software modification are on the rise.As a result, software
Qingfeng WANG, Hao LIANG, Yawen WANG, Genlin XIE, Benwei HE
doaj +5 more sources
Opaque predicates, veiled sets and their logic [PDF]
Latex2e, no ...
Krause, Decio, French, Steven
openaire +3 more sources
Using Exception Handling to Build Opaque Predicates in Intermediate Code Obfuscation Techniques
Microsoft's .NET Framework, and JAVA platforms, are based in a just-in-time compilation philosophy. Software developed using these technologies is executed in a hardware independent framework, which provides a full object-oriented environment, and in ...
Daniel Dolz, Gerardo Parra
doaj +2 more sources
True, false, paranormal, and 'designated'? : a reply to Jenkins [PDF]
PostprintPeer ...
C. Laat de +3 more
core +9 more sources
Rethinking Depictive Secondary Predicates A Pair- Merge approach and the Adjunct Condition
In this article I will propose a new analysis of depictive secondary predication structures. Previous studies of these structures are framed within different approaches: C-command / categorial approaches (Williams 1980, Rothstein 1983, 2001, Demonte 1988,
Violeta Demonte
semanticscholar +1 more source
Verification of Information Flow Properties under Rational Observation [PDF]
Information flow properties express the capability for an agent to infer information about secret behaviours of a partially observable system. In a language-theoretic setting, where the system behaviour is described by a language, we define the class of ...
Bérard, Béatrice, Mullins, John
core +4 more sources

