Results 141 to 150 of about 10,066 (160)
Some of the next articles are maybe not open access.
Generalized Dynamic Opaque Predicates: A New Control Flow Obfuscation Method
Lecture Notes in Computer Science, 2016Opaque predicate obfuscation, a low-cost and stealthy control flow obfuscation method to introduce superfluous branches, has been demonstrated to be effective to impede reverse engineering efforts and broadly used in various areas of software security.
Dongpeng Xu, Dinghao Wu
exaly +2 more sources
2014 Tenth International Conference on Computational Intelligence and Security, 2014
Static disassembly is used to analyze program control flow that is the key process of reverse analysis. Aiming at the problem that attackers are always using static disassembly to analyze control transfer instructions and control flow graph, a mixed obfuscation of overlapping instruction and self-modify code based on hyper-chaotic opaque predicates is ...
Fenlin Liu
exaly +2 more sources
Static disassembly is used to analyze program control flow that is the key process of reverse analysis. Aiming at the problem that attackers are always using static disassembly to analyze control transfer instructions and control flow graph, a mixed obfuscation of overlapping instruction and self-modify code based on hyper-chaotic opaque predicates is ...
Fenlin Liu
exaly +2 more sources
The Research of Multi-point Function Opaque Predicates Obfuscation Algorithm
Applied Mathematics and Information Sciences, 2014On the algorithm of code obfuscation, opaque predicate is used to confuse the judgment of the program branches to achieve complex control flow statement. Currently, there are problems o f obfuscation on the opaque predicate. The first problem is the isolation.
YANG Yubo +4 more
exaly +2 more sources
Assessing Opaque Predicates: Unveiling the Efficacy of Popular Obfuscators with a Rapid Deobfuscator
2023 30th Asia-Pacific Software Engineering Conference (APSEC), 2023Eun-Sun Cho
exaly +2 more sources
An Enhanced Opaque Predicate Detection Method with Synthesis and Recursive Matching
2025 IEEE 49th Annual Computers, Software, and Applications Conference (COMPSAC)Eun-Sun Cho
exaly +2 more sources
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015
Opaque predicates have been widely used to insert superfluous branches for control flow obfuscation. Opaque predicates can be seamlessly applied together with other obfuscation methods such as junk code to turn reverse engineering attempts into arduous work. Previous efforts in detecting opaque predicates are far from mature.
Jiang Ming 0002 +3 more
openaire +1 more source
Opaque predicates have been widely used to insert superfluous branches for control flow obfuscation. Opaque predicates can be seamlessly applied together with other obfuscation methods such as junk code to turn reverse engineering attempts into arduous work. Previous efforts in detecting opaque predicates are far from mature.
Jiang Ming 0002 +3 more
openaire +1 more source
2017 International Conference on Progress in Informatics and Computing (PIC), 2017
In order to enhance the white box security of software, we proposed a reduplicate code obfuscation algorithm to protect the source code. Firstly, we apply the parameter decomposition tree to formalize the code, and then we utilize flattening control flow system to decompose the source code into a multi-branch WHILE-SWITCH loop structure.
Zheheng Liang +4 more
openaire +1 more source
In order to enhance the white box security of software, we proposed a reduplicate code obfuscation algorithm to protect the source code. Firstly, we apply the parameter decomposition tree to formalize the code, and then we utilize flattening control flow system to decompose the source code into a multi-branch WHILE-SWITCH loop structure.
Zheheng Liang +4 more
openaire +1 more source
Quantificational DP arguments of opaque predicates in German
2019This thesis explores two aspects of the semantics of German sentences like (i), in which opaque predicates combine with DP arguments. Three classes of opaque predicates are considered: proposition-embedding predicates (i-a), question-embedding predicates (i-b) and intensional transitive verbs, which have been argued to take property arguments (i-c). (i)
openaire +1 more source
Constructing Opaque Predicate Using Homomorphic Encryption
2022Yohsuke Hirano, Yasuhiro Ohtaki
openaire +1 more source
Intertwining ROP Gadgets and Opaque Predicates for Robust Obfuscation.
CoRR, 2021Fukutomo Nakanishi +3 more
openaire +1 more source

