Results 231 to 240 of about 19,739 (264)
Some of the next articles are maybe not open access.
Obfuscated integration of software protections
International Journal of Information Security, 2020To counter man-at-the-end attacks such as reverse engineering and tampering, software is often protected with techniques that require support modules to be linked into the application. It is well known, however, that attackers can exploit the modular nature of applications and their protections to speed up the identification and comprehension process ...
Jens Van den Broeck +2 more
openaire +1 more source
Generating Effective Software Obfuscation Sequences With Reinforcement Learning
IEEE Transactions on Dependable and Secure Computing, 2022Obfuscation is a prevalent security technique which transforms syntactic representation of a program to a complicated form, but still keeps program semantics unchanged. So far, developers heavily rely on obfuscation to harden their products and reduce the risk of adversarial reverse engineering.
Huaijin Wang +4 more
openaire +2 more sources
Deobfuscation of virtualization-obfuscated software
Proceedings of the 18th ACM conference on Computer and communications security, 2011When new malware are discovered, it is important for researchers to analyze and understand them as quickly as possible. This task has been made more difficult in recent years as researchers have seen an increasing use of virtualization-obfuscated malware code.
Kevin Coogan, Gen Lu, Saumya Debray
openaire +1 more source
Software protection with increased complexity and obfuscation
Proceedings of the 50th Annual Southeast Regional Conference, 2012While many software solutions are provided through open source, the question of proprietary interest still remains. When outsourcing parts of a product's software development, there's a risk that the outsourcing partners will become competitors in the future.
Frank Tsui +2 more
openaire +1 more source
Stealthy code obfuscation technique for software security
The 2010 International Conference on Computer Engineering & Systems, 2010Code obfuscation, a tool converts a program into one that is functionally identical to the original but which is much more difficult for attacker to understand is currently the most viable technique for preventing malicious reverse engineering of software.
Saad M. Darwish +2 more
openaire +1 more source
Hopes, fears, and software obfuscation
Communications of the ACM, 2016What does it mean to be secure?
openaire +1 more source
Methods and software for the orogram obfuscation
2009 International Siberian Conference on Control and Communications, 2009On the basis of analysis of the obfuscation transformations the most rational set is given for automation of the obfuscation process. Design of Delphi software for automating obfuscation is proposed and described.
O.O. Shevtsova, D.N. Buintsev
openaire +1 more source
Information theory-based software metrics and obfuscation
Journal of Systems and Software, 2004Abstract A new approach to software metrics using concepts from information theory, data compression, complexity theory and analogies with real physical systems is described. A novel application of software obfuscation allows an existing software package to be analysed in terms of the effects of perturbations caused by the obfuscator.
Steven R Kirk, Samantha Jenkins
openaire +1 more source

