Results 1 to 10 of about 238 (139)
With the increasing complexity of software functions and the evolving technologies of network attacks, malicious behaviors such as software piracy, software cracking, data leakage, and malicious software modification are on the rise.As a result, software
Qingfeng WANG, Hao LIANG, Yawen WANG, Genlin XIE, Benwei HE
doaj +5 more sources
Stealthy Opaque Predicates in Hardware - Obfuscating Constant Expressions at Negligible Overhead
Opaque predicates are a well-established fundamental building block for software obfuscation. Simplified, an opaque predicate implements an expression that provides constant Boolean output, but appears to have dynamic behavior for static analysis.
Max Hoffmann, Christof Paar
doaj +4 more sources
Using Exception Handling to Build Opaque Predicates in Intermediate Code Obfuscation Techniques
Microsoft's .NET Framework, and JAVA platforms, are based in a just-in-time compilation philosophy. Software developed using these technologies is executed in a hardware independent framework, which provides a full object-oriented environment, and in ...
Daniel Dolz, Gerardo Parra
doaj +2 more sources
Opaque Predicates Detection by Abstract Interpretation [PDF]
Code obfuscation and software watermarking are well known techniques designed to prevent the illegal reuse of software. Code obfuscation prevents malicious reverse engineering, while software watermarking protects code from piracy. An interesting class of algorithms for code obfuscation and software watermarking relies on the insertion of opaque ...
DALLA PREDA, Mila +3 more
openaire +3 more sources
Defeating Opaque Predicates Statically through Machine Learning and Binary Analysis [PDF]
We present a new approach that bridges binary analysis techniques with machine learning classification for the purpose of providing a static and generic evaluation technique for opaque predicates, regardless of their constructions. We use this technique as a static automated deobfuscation tool to remove the opaque predicates introduced by obfuscation ...
Tofighi-Shirazi, Ramtine +3 more
openaire +2 more sources
Description of the approach to development of the obfuscating compiler
Nowadays protecting intellectual property rights for created software is very important because of many competing companies and ubiquitous piracy. The powerful technique for this protection is to obfuscate program code.
Sh. F. Kurmangaleev +2 more
doaj +1 more source
Predicates and proper names have been traditionally treated under different semantic categories. Proper names are considered as singular noncomplex terms whereas predicates are taken as general ones.
Alfonso García Suárez
doaj +1 more source
DNNobfus: a study on obfuscation-based edge-side model protection framework
The proliferation of artificial intelligence models has rendered them vulnerable to a myriad of security threats. The extensive integration of deep learning models into edge devices has introduced novel security challenges. Given the analogous structural
SONG Feiyang +6 more
doaj +3 more sources
Opaque predicates, veiled sets and their logic
Latex2e, no ...
Krause, Decio, French, Steven
openaire +2 more sources
An Approach to Reconstruction of Control Flow of an Obfuscated Program
Control flow obfuscation is one of widespread methods used to protect application binary code from analysis. The obfuscation transformations dramatically increase the complexity of separation and recognition of the algorithm and data structures.
Ilya N. Ledovskikh, Maxim G. Bakulin
doaj

