Results 231 to 240 of about 19,739 (264)
Some of the next articles are maybe not open access.

Obfuscated integration of software protections

International Journal of Information Security, 2020
To counter man-at-the-end attacks such as reverse engineering and tampering, software is often protected with techniques that require support modules to be linked into the application. It is well known, however, that attackers can exploit the modular nature of applications and their protections to speed up the identification and comprehension process ...
Jens Van den Broeck   +2 more
openaire   +1 more source

Generating Effective Software Obfuscation Sequences With Reinforcement Learning

IEEE Transactions on Dependable and Secure Computing, 2022
Obfuscation is a prevalent security technique which transforms syntactic representation of a program to a complicated form, but still keeps program semantics unchanged. So far, developers heavily rely on obfuscation to harden their products and reduce the risk of adversarial reverse engineering.
Huaijin Wang   +4 more
openaire   +2 more sources

Deobfuscation of virtualization-obfuscated software

Proceedings of the 18th ACM conference on Computer and communications security, 2011
When new malware are discovered, it is important for researchers to analyze and understand them as quickly as possible. This task has been made more difficult in recent years as researchers have seen an increasing use of virtualization-obfuscated malware code.
Kevin Coogan, Gen Lu, Saumya Debray
openaire   +1 more source

Software protection with increased complexity and obfuscation

Proceedings of the 50th Annual Southeast Regional Conference, 2012
While many software solutions are provided through open source, the question of proprietary interest still remains. When outsourcing parts of a product's software development, there's a risk that the outsourcing partners will become competitors in the future.
Frank Tsui   +2 more
openaire   +1 more source

Stealthy code obfuscation technique for software security

The 2010 International Conference on Computer Engineering & Systems, 2010
Code obfuscation, a tool converts a program into one that is functionally identical to the original but which is much more difficult for attacker to understand is currently the most viable technique for preventing malicious reverse engineering of software.
Saad M. Darwish   +2 more
openaire   +1 more source

Hopes, fears, and software obfuscation

Communications of the ACM, 2016
What does it mean to be secure?
openaire   +1 more source

Methods and software for the orogram obfuscation

2009 International Siberian Conference on Control and Communications, 2009
On the basis of analysis of the obfuscation transformations the most rational set is given for automation of the obfuscation process. Design of Delphi software for automating obfuscation is proposed and described.
O.O. Shevtsova, D.N. Buintsev
openaire   +1 more source

Information theory-based software metrics and obfuscation

Journal of Systems and Software, 2004
Abstract A new approach to software metrics using concepts from information theory, data compression, complexity theory and analogies with real physical systems is described. A novel application of software obfuscation allows an existing software package to be analysed in terms of the effects of perturbations caused by the obfuscator.
Steven R Kirk, Samantha Jenkins
openaire   +1 more source

Home - About - Disclaimer - Privacy