Results 111 to 120 of about 238 (139)
Some of the next articles are maybe not open access.
2014 Tenth International Conference on Computational Intelligence and Security, 2014
Static disassembly is used to analyze program control flow that is the key process of reverse analysis. Aiming at the problem that attackers are always using static disassembly to analyze control transfer instructions and control flow graph, a mixed obfuscation of overlapping instruction and self-modify code based on hyper-chaotic opaque predicates is ...
Xin Xie, Fenlin Liu, Bin Lu, Fei Xiang
openaire +1 more source
Static disassembly is used to analyze program control flow that is the key process of reverse analysis. Aiming at the problem that attackers are always using static disassembly to analyze control transfer instructions and control flow graph, a mixed obfuscation of overlapping instruction and self-modify code based on hyper-chaotic opaque predicates is ...
Xin Xie, Fenlin Liu, Bin Lu, Fei Xiang
openaire +1 more source
Generalized Dynamic Opaque Predicates: A New Control Flow Obfuscation Method
2016Opaque predicate obfuscation, a low-cost and stealthy control flow obfuscation method to introduce superfluous branches, has been demonstrated to be effective to impede reverse engineering efforts and broadly used in various areas of software security.
Dongpeng Xu, Jiang Ming, Dinghao Wu
openaire +1 more source
On the Use of Opaque Predicates in Mobile Agent Code Obfuscation
2005Mobile agent technology is an evolving paradigm that combines the inherent characteristics of intelligent agents, namely, adaptability, reactivity and autonomy with mobility. These characteristics of mobile agents provide an excellent means of meeting the distributed and heterogeneous requirements of many military applications that involve low ...
Anirban Majumdar, Clark Thomborson
openaire +1 more source
Quantificational DP arguments of opaque predicates in German
2019This thesis explores two aspects of the semantics of German sentences like (i), in which opaque predicates combine with DP arguments. Three classes of opaque predicates are considered: proposition-embedding predicates (i-a), question-embedding predicates (i-b) and intensional transitive verbs, which have been argued to take property arguments (i-c). (i)
openaire +1 more source
Constructing Opaque Predicate Using Homomorphic Encryption
2022Yohsuke Hirano, Yasuhiro Ohtaki
openaire +1 more source
Assessing Opaque Predicates: Unveiling the Efficacy of Popular Obfuscators with a Rapid Deobfuscator
2023 30th Asia-Pacific Software Engineering Conference (APSEC), 2023Hyeongchang Jeon +3 more
openaire +1 more source
Integrative oncology: Addressing the global challenges of cancer prevention and treatment
Ca-A Cancer Journal for Clinicians, 2022Jun J Mao,, Msce +2 more
exaly
Multidisciplinary standards of care and recent progress in pancreatic ductal adenocarcinoma
Ca-A Cancer Journal for Clinicians, 2020Aaron J Grossberg +2 more
exaly
Dynamic Opaque Predicate Detection with a Recursive Matching Method
2024 IEEE 48th Annual Computers, Software, and Applications Conference (COMPSAC)Hyeongchang Jeon +2 more
openaire +1 more source

