Results 1 to 10 of about 19,739 (264)
Layered obfuscation: a taxonomy of software obfuscation techniques for layered security [PDF]
Software obfuscation has been developed for over 30 years. A problem always confusing the communities is what security strength the technique can achieve.
Hui Xu +3 more
doaj +2 more sources
Measuring Software Obfuscation Quality–A Systematic Literature Review [PDF]
Software obfuscation techniques are increasingly being used to prevent attackers from exploiting security flaws and launching successful attacks. With research on software obfuscation techniques rapidly growing, many software obfuscation techniques with ...
Shouki A. Ebad +2 more
doaj +2 more sources
With the increasing complexity of software functions and the evolving technologies of network attacks, malicious behaviors such as software piracy, software cracking, data leakage, and malicious software modification are on the rise.As a result, software
Qingfeng WANG, Hao LIANG, Yawen WANG, Genlin XIE, Benwei HE
doaj +3 more sources
ERMDS: A obfuscation dataset for evaluating robustness of learning-based malware detection system
Learning-based malware detection systems (LB-MDS) play a crucial role in defending computer systems from malicious attacks. Nevertheless, these systems can be vulnerable to various attacks, which can have significant consequences.
Lichen Jia +3 more
doaj +1 more source
Review of path branch obfuscation
Code obfuscation is a convenient and effective technique of software protection,which can combat MATE attacks based on reverse engineering.With the development of automatic programming analysis technology,a new code obfuscation technique which named path
Pu GENG, Yuefei ZHU
doaj +3 more sources
Evaluation of Survivability of the Automatically Obfuscated Android Malware
Malware is a growing threat to all mobile platforms and hundreds of new malicious applications are being detected every day. At the same time, the development of automated software obfuscation techniques allows for the easy production of new malware ...
Himanshu Patel +9 more
doaj +1 more source
Packed malware variants detection using deep belief networks [PDF]
Malware is one of the most serious network security threats. To detect unknown variants of malware, many researches have proposed various methods of malware detection based on machine learning in recent years.
Zhang Zhigang +3 more
doaj +1 more source
Interaction of Secure Cloud Network and Crowd Computing for Smart City Data Obfuscation
There can be many inherent issues in the process of managing cloud infrastructure and the platform of the cloud. The platform of the cloud manages cloud software and legality issues in making contracts.
Manikandan Thirumalaisamy +6 more
doaj +1 more source
LifeLine for FPGA Protection: Obfuscated Cryptography for Real-World Security
Over the last decade attacks have repetitively demonstrated that bitstream protection for SRAM-based FPGAs is a persistent problem without a satisfying solution in practice.
Florian Stolz +9 more
doaj +1 more source
Deoptfuscator: Defeating Advanced Control-Flow Obfuscation Using Android Runtime (ART)
Code obfuscation is a technique that makes it difficult for code analyzers to understand a program by transforming its structures or operations while maintaining its original functionality.
Geunha You +4 more
doaj +1 more source

