Results 251 to 260 of about 19,739 (264)
Some of the next articles are maybe not open access.

A Novel Software Protection Approach for Code Obfuscation to Enhance Software Security

International Journal of Mobile Computing and Multimedia Communications, 2017
Over the past few decades ago, software developers analyzed robustly several forms of software protection against illegal copying or piracy. With the expansion in digital technology, the risk of illegal copying of software also amplifies. The increasing piracy rate has posed a serious threat to software developers leading to the development of various ...
Pratiksha Gautam, Hemraj Saini
openaire   +1 more source

Software Obfuscation: Theory and Practice

2023
Software Obfuscation: Theory and Practice explora la tarea de ocultar el código fuente de un programa de forma criptográfica, también conocido como ofuscación, enfocándose en sus fundamentos teóricos y aplicaciones prácticas. Inicialmente, la tesis proporciona una visión general de cómo y por qué se usa la ofuscación en el software hoy en día ...
openaire   +1 more source

Estimating Software Obfuscation Potency with Artificial Neural Networks

2017
This paper presents an approach to estimate the potency of obfuscation techniques. Our approach uses neural networks to accurately predict the value of complexity metrics – which are used to compute the potency – after an obfuscation transformation is applied to a code region.
CANAVESE, DANIELE   +3 more
openaire   +2 more sources

Defeating Hardware Trojan through Software Obfuscation

2017
In recent years a new kind of threat, known as Hard- ware Trojan, is affecting the Integrated Circuit industry. Due to the segmentation in the production, untrusted parties involved in the supply chain may illegally inject additional hardware components, that, under specific circumstances, act for malicious purposes.
MARCELLI, ANDREA   +3 more
openaire   +1 more source

A Software Fingerprinting Scheme for Java Using Classfiles Obfuscation

2004
Embedding a personal identifier as a watermark to Java classfile is effective in order to protect copyrights of them. Monden et al. [1] proposed watermarking scheme that embeds arbitrary character sequence to the target method in a Java classfiles. But the scheme can be only used to embed the same watermark to each user’s classfiles.
Kazuhide Fukushima, Kouichi Sakurai
openaire   +1 more source

Patchable Indistinguishability Obfuscation: $$i\mathcal {O}$$ for Evolving Software

2017
In this work, we introduce patchable indistinguishability obfuscation: our notion adapts the notion of indistinguishability obfuscation (\({i\mathcal {O}}\)) to a very general setting where obfuscated software evolves over time. We model this broadly by considering software patches P as arbitrary Turing Machines that take as input the description of a ...
Prabhanjan Ananth   +2 more
openaire   +1 more source

Obfuscator-LLVM -- Software Protection for the Masses

2015 IEEE/ACM 1st International Workshop on Software Protection, 2015
Pascal Junod   +3 more
openaire   +1 more source

A Tutorial on Software Obfuscation

2018
Sebastian Banescu, Alexander Pretschner
openaire   +1 more source

Home - About - Disclaimer - Privacy