Results 11 to 20 of about 19,739 (264)

Protecting Software through Obfuscation:Can It Keep Pace with Progress in Code Analysis? [PDF]

open access: yesACM Computing Surveys, 2016
Software obfuscation has always been a controversially discussed research area. While theoretical results indicate that provably secure obfuscation in general is impossible, its widespread application in malware and commercial software shows that it is ...
Katzenbeisser, Stefan   +4 more
core   +2 more sources

Assessment of Source Code Obfuscation Techniques [PDF]

open access: yes, 2016
Obfuscation techniques are a general category of software protections widely adopted to prevent malicious tampering of the code by making applications more difficult to understand and thus harder to modify.
Basile, Cataldo   +6 more
core   +2 more sources

A Comprehensive Analysis of Software Obfuscation Techniques

open access: yesInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology, 2023
In today's environment, a huge and increasing range of unauthorised practises allows hackers to get unauthorised access to devices and private information by inserting harmful code. The purpose of this research is to assess the efficiency of obfuscation strategies in safeguarding software against reverse engineering and tampering.
null Priyanka Kadam   +2 more
openaire   +1 more source

The current state of art in program obfuscations:definitions of obfuscation security

open access: yesТруды Института системного программирования РАН, 2018
Program obfuscation is a semantic-preserving transformation aimed at bringing a program into such a form, which impedes the understanding of its algorithm and data structures or prevents extracting of some valuable information from the text of a program.
N. P. Varnovsky   +3 more
doaj   +1 more source

Partial Evaluation of String Obfuscations for Java Malware Detection [PDF]

open access: yes, 2016
The fact that Java is platform independent gives hackers the opportunity to write exploits that can target users on any platform, which has a JVM implementation. Metasploit is a well-known source of Javaexploits and to circumvent detection by Anti Virus (
Chawdhary, Aziem   +2 more
core   +1 more source

Obfuscation-based malware update: A comparison of manual and automated methods [PDF]

open access: yes, 2017
Indexación: Scopus; Web of Science.This research presents a proposal of malware classification and its update based on capacity and obfuscation. This article is an extension of [4]a, and describes the procedure for malware updating, that is, to take ...
Barría, C.   +4 more
core   +2 more sources

Partial Evaluation for Java Malware Detection [PDF]

open access: yes, 2015
The fact that Java is platform independent gives hackers the opportunity to write exploits that can target users on any platform, which has a JVM implementation. Metasploit is a well-known source of Java exploits and to circumvent detection by Anti Virus
A Flexeder   +6 more
core   +1 more source

ERIC: An Efficient and Practical Software Obfuscation Framework

open access: yes2022 52nd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), 2022
Modern cloud computing systems distribute software executables over a network to keep the software sources, which are typically compiled in a security-critical cluster, secret. We develop ERIC, a new, efficient, and general software obfuscation framework.
Bolat A.   +4 more
openaire   +5 more sources

Understanding Android Obfuscation Techniques: A Large-Scale Investigation in the Wild [PDF]

open access: yes, 2018
In this paper, we seek to better understand Android obfuscation and depict a holistic view of the usage of obfuscation through a large-scale investigation in the wild.
Chen, Kai   +9 more
core   +2 more sources

Enhanced Obfuscation for Software Protection in Autonomous Vehicular Cloud Computing Platforms

open access: yesIEEE Access, 2022
Nowadays, sensors, communications connections, and more powerful computing capabilities are added to automobiles, making them more intelligent.
Muhammad Hataba   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy