Results 1 to 10 of about 10,033 (127)

Opaque Predicates Detection by Abstract Interpretation [PDF]

open access: yesLecture Notes in Computer Science, 2006
Code obfuscation and software watermarking are well known techniques designed to prevent the illegal reuse of software. Code obfuscation prevents malicious reverse engineering, while software watermarking protects code from piracy. An interesting class of algorithms for code obfuscation and software watermarking relies on the insertion of opaque ...
Koen De Bosschere   +2 more
exaly   +6 more sources

Constructing method of opaque predicate based on type conversion and operation of floating point numbers

open access: yes网络与信息安全学报, 2023
With the increasing complexity of software functions and the evolving technologies of network attacks, malicious behaviors such as software piracy, software cracking, data leakage, and malicious software modification are on the rise.As a result, software
Qingfeng WANG, Hao LIANG, Yawen WANG, Genlin XIE, Benwei HE
doaj   +5 more sources

Stealthy Opaque Predicates in Hardware - Obfuscating Constant Expressions at Negligible Overhead

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2018
Opaque predicates are a well-established fundamental building block for software obfuscation. Simplified, an opaque predicate implements an expression that provides constant Boolean output, but appears to have dynamic behavior for static analysis.
Max Hoffmann, Christof Paar
doaj   +4 more sources

Defeating Opaque Predicates Statically through Machine Learning and Binary Analysis [PDF]

open access: yesProceedings of the 3rd ACM Workshop on Software Protection, 2019
We present a new approach that bridges binary analysis techniques with machine learning classification for the purpose of providing a static and generic evaluation technique for opaque predicates, regardless of their constructions. We use this technique as a static automated deobfuscation tool to remove the opaque predicates introduced by obfuscation ...
Ramtine Tofighi-Shirazi   +3 more
exaly   +3 more sources

Using Exception Handling to Build Opaque Predicates in Intermediate Code Obfuscation Techniques

open access: yesJournal of Computer Science and Technology, 2008
Microsoft's .NET Framework, and JAVA platforms, are based in a just-in-time compilation philosophy. Software developed using these technologies is executed in a hardware independent framework, which provides a full object-oriented environment, and in ...
Daniel Dolz, Gerardo Parra
doaj   +2 more sources

A Heuristic Approach to Detect Opaque Predicates that Disrupt Static Disassembly

open access: yesProceedings 2020 Workshop on Binary Analysis Research, 2020
Ian G Harris
exaly   +2 more sources

The Metaphysics of Moral Explanations [PDF]

open access: yes, 2020
It’s commonly held that particular moral facts are explained by ‘natural’ or ‘descriptive’ facts, though there’s disagreement over how such explanations work.
Fogal, Daniel, Risberg, Olle
core   +1 more source

Verification of Information Flow Properties under Rational Observation [PDF]

open access: yes, 2014
Information flow properties express the capability for an agent to infer information about secret behaviours of a partially observable system. In a language-theoretic setting, where the system behaviour is described by a language, we define the class of ...
Bérard, Béatrice, Mullins, John
core   +4 more sources

Description of the approach to development of the obfuscating compiler

open access: yesТруды Института системного программирования РАН, 2018
Nowadays protecting intellectual property rights for created software is very important because of many competing companies and ubiquitous piracy. The powerful technique for this protection is to obfuscate program code.
Sh. F. Kurmangaleev   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy