Results 251 to 260 of about 19,739 (264)
Some of the next articles are maybe not open access.
A Novel Software Protection Approach for Code Obfuscation to Enhance Software Security
International Journal of Mobile Computing and Multimedia Communications, 2017Over the past few decades ago, software developers analyzed robustly several forms of software protection against illegal copying or piracy. With the expansion in digital technology, the risk of illegal copying of software also amplifies. The increasing piracy rate has posed a serious threat to software developers leading to the development of various ...
Pratiksha Gautam, Hemraj Saini
openaire +1 more source
Software Obfuscation: Theory and Practice
2023Software Obfuscation: Theory and Practice explora la tarea de ocultar el código fuente de un programa de forma criptográfica, también conocido como ofuscación, enfocándose en sus fundamentos teóricos y aplicaciones prácticas. Inicialmente, la tesis proporciona una visión general de cómo y por qué se usa la ofuscación en el software hoy en día ...
openaire +1 more source
Estimating Software Obfuscation Potency with Artificial Neural Networks
2017This paper presents an approach to estimate the potency of obfuscation techniques. Our approach uses neural networks to accurately predict the value of complexity metrics – which are used to compute the potency – after an obfuscation transformation is applied to a code region.
CANAVESE, DANIELE +3 more
openaire +2 more sources
Defeating Hardware Trojan through Software Obfuscation
2017In recent years a new kind of threat, known as Hard- ware Trojan, is affecting the Integrated Circuit industry. Due to the segmentation in the production, untrusted parties involved in the supply chain may illegally inject additional hardware components, that, under specific circumstances, act for malicious purposes.
MARCELLI, ANDREA +3 more
openaire +1 more source
A Software Fingerprinting Scheme for Java Using Classfiles Obfuscation
2004Embedding a personal identifier as a watermark to Java classfile is effective in order to protect copyrights of them. Monden et al. [1] proposed watermarking scheme that embeds arbitrary character sequence to the target method in a Java classfiles. But the scheme can be only used to embed the same watermark to each user’s classfiles.
Kazuhide Fukushima, Kouichi Sakurai
openaire +1 more source
Patchable Indistinguishability Obfuscation: $$i\mathcal {O}$$ for Evolving Software
2017In this work, we introduce patchable indistinguishability obfuscation: our notion adapts the notion of indistinguishability obfuscation (\({i\mathcal {O}}\)) to a very general setting where obfuscated software evolves over time. We model this broadly by considering software patches P as arbitrary Turing Machines that take as input the description of a ...
Prabhanjan Ananth +2 more
openaire +1 more source
Obfuscator-LLVM -- Software Protection for the Masses
2015 IEEE/ACM 1st International Workshop on Software Protection, 2015Pascal Junod +3 more
openaire +1 more source
A Tutorial on Software Obfuscation
2018Sebastian Banescu, Alexander Pretschner
openaire +1 more source
Technical Perspective: A breakthrough in software obfuscation
Communications of the ACM, 2016openaire +1 more source
Quantitative Evaluation on the Robustness for Software Obfuscating Transformation
Journal of Software, 2014Jian-Jing FU, Ke WANG
openaire +1 more source

