Results 241 to 250 of about 19,739 (264)
Some of the next articles are maybe not open access.
Assessing the Security Properties of Software Obfuscation
IEEE Security & Privacy, 2016The battle between software obfuscation and reverse engineering has been ongoing for decades. Yet the degree of security that obfuscation actually guarantees remains unclear. Obfuscation's security properties and challenges to achieving a valid security property are evaluated.
Hui Xu, Michael R. Lyu
openaire +1 more source
A New Code Obfuscation Scheme for Software Protection
2014 IEEE 8th International Symposium on Service Oriented System Engineering, 2014IT industry loses tens of billions of dollars annually from security attacks such as tampering and malicious reverse engineering. Code obfuscation techniques counter such attacks by transforming code into patterns that resist the attacks. None of the current code obfuscation techniques satisfy all the obfuscation effectiveness criteria such as ...
Aniket Kulkarni, Ravindra Metta
openaire +1 more source
Software Protection with Obfuscation and Encryption
2013Software code released to the user has the risk of reverse engineering attacks. Software obfuscation is one of the techniques used to make the reverse engineering of software programs hard. In this paper, we propose an obfuscation algorithm, which is applied to the assembly code generated by the compiler. Our method uses both obfuscation and encryption,
Vivek Balachandran, Sabu Emmanuel
openaire +1 more source
A Software Engineering Methodology for Developing Secure Obfuscated Software
2019We propose a methodology to conciliate two apparently contradictory processes in the development of secure obfuscated software and good software engineered software. Our methodology consists first in the system designers defining the type of security level required for the software.
Carlos Gonzalez, Ernesto LiƱan
openaire +1 more source
Function Level Control Flow Obfuscation for Software Security
2014 Eighth International Conference on Complex, Intelligent and Software Intensive Systems, 2014Software released to the user has the risk of reverse engineering attacks. Software control flow obfuscation is one of the techniques used to make the reverse engineering of software programs harder. Control flow obfuscation, obscures the control flow of the program so that it is hard for an analyzer to decode the logic of the program.
Vivek Balachandran +2 more
openaire +1 more source
Software Watermarking Through Obfuscated Interpretation: Implementation and Analysis
Journal of Multimedia, 2011A robust software watermarking scheme under which the watermark can resist against various attacks including collusion attacks is proposed based on obfuscated interpretation. The idea is to spread the watermark over the entire program by modifying instruction frequencies. The obfuscated interpretation technique is introduced into the scheme to not only
Ying Zeng +3 more
openaire +1 more source
AES-SEC: Improving Software Obfuscation through Hardware-Assistance
2014 Ninth International Conference on Availability, Reliability and Security, 2014While the resilience of software-only code obfuscation remains unclear and ultimately depends only on available resources and patience of the attacker, hardware-based software protection approaches can provide a much higher level of protection against program analysis.
Sebastian Schrittwieser +4 more
openaire +1 more source
Robust Software Watermarking Scheme Based on Obfuscated Interpretation
2010 International Conference on Multimedia Information Networking and Security, 2010A robust software watermarking scheme under which the watermark can resist against various attacks includ-ing collusion attacks is proposed based on obfuscated interpretation. The obfuscated interpretation technique can not only hide the functionality of a given program, but also provide an alternative simple way to modify the code.
Ying Zeng +3 more
openaire +1 more source
Applications of Homomorphic Functions to Software Obfuscation
2006As various computers are connected into a world wide network, software is a target of copyright pirates, attackers, or even terrorists, as a result, software protections become a more and more important issue for software users and developers. There are some technical measures for software protections, such as hardware-based protections and software ...
William Zhu +2 more
openaire +1 more source
Three control flow obfuscation methods for Java software
IEE Proceedings - Software, 2006Three novel control computation (control flow) obfuscation methods are described for protecting Java class files. They are basic block fission obfuscation, intersecting loop obfuscation and replacing goto obfuscation. The basic block fission obfuscation splits some chosen basic block(s) into more basic blocks, in which opaque predicates and goto ...
T.W. Hou, H.Y. Chen, M.H. Tsai
openaire +1 more source

