Results 11 to 20 of about 19,937 (276)

Deoptfuscator: Defeating Advanced Control-Flow Obfuscation Using Android Runtime (ART)

open access: yesIEEE Access, 2022
Code obfuscation is a technique that makes it difficult for code analyzers to understand a program by transforming its structures or operations while maintaining its original functionality.
Geunha You   +4 more
doaj   +1 more source

Assessment of Source Code Obfuscation Techniques [PDF]

open access: yes, 2016
Obfuscation techniques are a general category of software protections widely adopted to prevent malicious tampering of the code by making applications more difficult to understand and thus harder to modify.
Basile, Cataldo   +6 more
core   +2 more sources

The current state of art in program obfuscations:definitions of obfuscation security

open access: yesТруды Института системного программирования РАН, 2018
Program obfuscation is a semantic-preserving transformation aimed at bringing a program into such a form, which impedes the understanding of its algorithm and data structures or prevents extracting of some valuable information from the text of a program.
N. P. Varnovsky   +3 more
doaj   +1 more source

Partial Evaluation for Java Malware Detection [PDF]

open access: yes, 2015
The fact that Java is platform independent gives hackers the opportunity to write exploits that can target users on any platform, which has a JVM implementation. Metasploit is a well-known source of Java exploits and to circumvent detection by Anti Virus
A Flexeder   +6 more
core   +1 more source

Partial Evaluation of String Obfuscations for Java Malware Detection [PDF]

open access: yes, 2016
The fact that Java is platform independent gives hackers the opportunity to write exploits that can target users on any platform, which has a JVM implementation. Metasploit is a well-known source of Javaexploits and to circumvent detection by Anti Virus (
Chawdhary, Aziem   +2 more
core   +1 more source

Understanding Android Obfuscation Techniques: A Large-Scale Investigation in the Wild [PDF]

open access: yes, 2018
In this paper, we seek to better understand Android obfuscation and depict a holistic view of the usage of obfuscation through a large-scale investigation in the wild.
Chen, Kai   +9 more
core   +2 more sources

Enhanced Obfuscation for Software Protection in Autonomous Vehicular Cloud Computing Platforms

open access: yesIEEE Access, 2022
Nowadays, sensors, communications connections, and more powerful computing capabilities are added to automobiles, making them more intelligent.
Muhammad Hataba   +2 more
doaj   +1 more source

ERIC: An Efficient and Practical Software Obfuscation Framework

open access: yes2022 52nd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), 2022
Modern cloud computing systems distribute software executables over a network to keep the software sources, which are typically compiled in a security-critical cluster, secret. We develop ERIC, a new, efficient, and general software obfuscation framework.
Alperen Bolat   +4 more
openaire   +5 more sources

Obfuscation for Privacy-preserving Syntactic Parsing [PDF]

open access: yes, 2020
The goal of homomorphic encryption is to encrypt data such that another party can operate on it without being explicitly exposed to the content of the original data.
Cohen, Shay B.   +3 more
core   +2 more sources

SCORE: Source Code Optimization & REconstruction

open access: yesIEEE Access, 2020
The main goal of obfuscation is to make software difficult to analyze. Although obfuscation is one useful method to protect programs, the ability to analyze malware is greatly reduced if used for malicious purposes.
Jae Hyuk Suk   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy