Results 231 to 240 of about 19,937 (276)
Some of the next articles are maybe not open access.

Methods and software for the orogram obfuscation

2009 International Siberian Conference on Control and Communications, 2009
On the basis of analysis of the obfuscation transformations the most rational set is given for automation of the obfuscation process. Design of Delphi software for automating obfuscation is proposed and described.
O.O. Shevtsova, D.N. Buintsev
exaly   +2 more sources

Information theory-based software metrics and obfuscation

Journal of Systems and Software, 2004
Abstract A new approach to software metrics using concepts from information theory, data compression, complexity theory and analogies with real physical systems is described. A novel application of software obfuscation allows an existing software package to be analysed in terms of the effects of perturbations caused by the obfuscator.
Steven R Kirk, Samantha Jenkins
exaly   +2 more sources

The performance cost of software obfuscation for Android applications

Computers and Security, 2018
Abstract Software security of Android applications is especially susceptible (vulnerable) to malicious reverse engineer than the native code based software, because its Java bytecode is easier to decompile and to reconstruct the original Java source code.
Yan Zhuang
exaly   +2 more sources

Generating Effective Software Obfuscation Sequences With Reinforcement Learning

IEEE Transactions on Dependable and Secure Computing, 2022
Obfuscation is a prevalent security technique which transforms syntactic representation of a program to a complicated form, but still keeps program semantics unchanged. So far, developers heavily rely on obfuscation to harden their products and reduce the risk of adversarial reverse engineering.
Huaijin Wang, Shuai Wang, Dongpeng Xu
exaly   +3 more sources

Function Level Control Flow Obfuscation for Software Security

2014 Eighth International Conference on Complex, Intelligent and Software Intensive Systems, 2014
Software released to the user has the risk of reverse engineering attacks. Software control flow obfuscation is one of the techniques used to make the reverse engineering of software programs harder. Control flow obfuscation, obscures the control flow of the program so that it is hard for an analyzer to decode the logic of the program.
Vivek Balachandran, Sabu Emmanuel
exaly   +2 more sources

A New Compile-Time Obfuscation Scheme for Software Protection

2016 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC), 2016
With the development of reverse engineering, the software industry has suffered a great loss from the software piracy and malicious attack for a long time. What is ridiculous is that code obfuscation techniques that originate from malware can hide specific function of a program from malicious analysis and is frequently employed to mitigate this risk ...
Yujia Zhang, Jianmin Pang
exaly   +2 more sources

Obfuscated integration of software protections

International Journal of Information Security, 2020
To counter man-at-the-end attacks such as reverse engineering and tampering, software is often protected with techniques that require support modules to be linked into the application. It is well known, however, that attackers can exploit the modular nature of applications and their protections to speed up the identification and comprehension process ...
Jens Van den Broeck   +2 more
openaire   +1 more source

Software protection with increased complexity and obfuscation

Proceedings of the 50th Annual Southeast Regional Conference, 2012
While many software solutions are provided through open source, the question of proprietary interest still remains. When outsourcing parts of a product's software development, there's a risk that the outsourcing partners will become competitors in the future.
Frank Tsui   +2 more
openaire   +1 more source

Deobfuscation of virtualization-obfuscated software

Proceedings of the 18th ACM conference on Computer and communications security, 2011
When new malware are discovered, it is important for researchers to analyze and understand them as quickly as possible. This task has been made more difficult in recent years as researchers have seen an increasing use of virtualization-obfuscated malware code.
Kevin Coogan, Gen Lu, Saumya K. Debray
openaire   +1 more source

Software Protection with Obfuscation and Encryption

2013
Software code released to the user has the risk of reverse engineering attacks. Software obfuscation is one of the techniques used to make the reverse engineering of software programs hard. In this paper, we propose an obfuscation algorithm, which is applied to the assembly code generated by the compiler. Our method uses both obfuscation and encryption,
Vivek Balachandran, Sabu Emmanuel
openaire   +1 more source

Home - About - Disclaimer - Privacy