Results 131 to 140 of about 189,996 (174)
Some of the next articles are maybe not open access.
Software watermarking via opaque predicates: Implementation, analysis, and attacks
Electronic Commerce Research, 2006Within the software industry software piracy is a great concern. In this article we address this issue through a prevention technique called software watermarking. Depending on how a software watermark is applied it can be used to discourage piracy; as proof of authorship or purchase; or to track the source of the illegal redistribution.
Ginger Myles, Christian Collberg
openaire +2 more sources
Securing Mobile Agents Control Flow Using Opaque Predicates
International Conference on Knowledge-Based Intelligent Information & Engineering Systems, 2005Mobile agent technology is an evolving paradigm that combines the inherent characteristics of intelligent agents, namely, adaptability, reactivity and autonomy with mobility. These characteristics of mobile agents provide an excellent means of meeting the distributed and heterogeneous requirements for many electronic commerce applications involving low
Anirban Majumdar, Clark Thomborson
openaire +2 more sources
Generalized Dynamic Opaque Predicates: A New Control Flow Obfuscation Method
Information Security Conference, 2016Opaque predicate obfuscation, a low-cost and stealthy control flow obfuscation method to introduce superfluous branches, has been demonstrated to be effective to impede reverse engineering efforts and broadly used in various areas of software security.
Dongpeng Xu, Jiang Ming, Dinghao Wu
openaire +2 more sources
The Research of Multi-point Function Opaque Predicates Obfuscation Algorithm
Applied Mathematics & Information Sciences, 2014On the algorithm of code obfuscation, opaque predicate is used to confuse the judgment of the program branches to achieve complex control flow statement. Currently, there are problems o f obfuscation on the opaque predicate. The first problem is the isolation.
YANG Yubo +4 more
openaire +2 more sources
2014 Tenth International Conference on Computational Intelligence and Security, 2014
Static disassembly is used to analyze program control flow that is the key process of reverse analysis. Aiming at the problem that attackers are always using static disassembly to analyze control transfer instructions and control flow graph, a mixed obfuscation of overlapping instruction and self-modify code based on hyper-chaotic opaque predicates is ...
Xin Xie, Fenlin Liu, Bin Lu, Fei Xiang
openaire +2 more sources
Static disassembly is used to analyze program control flow that is the key process of reverse analysis. Aiming at the problem that attackers are always using static disassembly to analyze control transfer instructions and control flow graph, a mixed obfuscation of overlapping instruction and self-modify code based on hyper-chaotic opaque predicates is ...
Xin Xie, Fenlin Liu, Bin Lu, Fei Xiang
openaire +2 more sources
Opaque Predicate Detection by Static Analysis of Binary Executables
International Symposium on Security in Computing and Communications, 2017Opaque Predicates are one of the most covert methods employed by obfuscators to mitigate the risk of reverse engineering of code. Detecting the presence of opaque predicates in a program is an arduous problem since, it is challenging to differentiate between the conditional expressions present in the program and the extraneous expressions added by the ...
R. Krishna Ram Prakash +2 more
openaire +2 more sources
On the Use of Opaque Predicates in Mobile Agent Code Obfuscation
Intelligence and Security Informatics, 2005Mobile agent technology is an evolving paradigm that combines the inherent characteristics of intelligent agents, namely, adaptability, reactivity and autonomy with mobility. These characteristics of mobile agents provide an excellent means of meeting the distributed and heterogeneous requirements of many military applications that involve low ...
Anirban Majumdar, Clark Thomborson
openaire +2 more sources
An Enhanced Opaque Predicate Detection Method with Synthesis and Recursive Matching
2025 IEEE 49th Annual Computers, Software, and Applications Conference (COMPSAC)Program obfuscation transforms source code into a complex, harder-to-analyze form while preserving functionality, commonly used for intellectual property protection and security. Although it is also exploited by malware developers.
Hyeongchang Jeon +2 more
openaire +2 more sources
2017 International Conference on Progress in Informatics and Computing (PIC), 2017
In order to enhance the white box security of software, we proposed a reduplicate code obfuscation algorithm to protect the source code. Firstly, we apply the parameter decomposition tree to formalize the code, and then we utilize flattening control flow system to decompose the source code into a multi-branch WHILE-SWITCH loop structure.
Zheheng Liang +4 more
openaire +2 more sources
In order to enhance the white box security of software, we proposed a reduplicate code obfuscation algorithm to protect the source code. Firstly, we apply the parameter decomposition tree to formalize the code, and then we utilize flattening control flow system to decompose the source code into a multi-branch WHILE-SWITCH loop structure.
Zheheng Liang +4 more
openaire +2 more sources
An N-State Opaque Predicate Obfuscation Algorithm Based on Henon Map
IEICE Transactions on Fundamentals of Electronics, Communications and Computer SciencesSUMMARY In recent years, chaos maps and opaque predicates have received widespread attention in the field of code obfuscation. Chaos map is proved opaque in n-state predicates code obfuscation.
Yindong CHEN +2 more
openaire +2 more sources

