Results 251 to 260 of about 19,937 (276)
Some of the next articles are maybe not open access.

Software Watermarking Through Obfuscated Interpretation: Implementation and Analysis

Journal of Multimedia, 2011
A robust software watermarking scheme under which the watermark can resist against various attacks including collusion attacks is proposed based on obfuscated interpretation. The idea is to spread the watermark over the entire program by modifying instruction frequencies. The obfuscated interpretation technique is introduced into the scheme to not only
Ying Zeng   +3 more
openaire   +1 more source

Software Obfuscation: Theory and Practice

2023
Software Obfuscation: Theory and Practice explora la tarea de ocultar el código fuente de un programa de forma criptográfica, también conocido como ofuscación, enfocándose en sus fundamentos teóricos y aplicaciones prácticas. Inicialmente, la tesis proporciona una visión general de cómo y por qué se usa la ofuscación en el software hoy en día ...
openaire   +1 more source

On the Impact of Code Obfuscation to Software Energy Consumption

2017
The energy consumption of software systems is an area of increasing interest, especially for mobile application developers. A number of studies have been published that address possible optimizations of energy use and linked quality attributes such as performance.
openaire   +1 more source

A Software Fingerprinting Scheme for Java Using Classfiles Obfuscation

2004
Embedding a personal identifier as a watermark to Java classfile is effective in order to protect copyrights of them. Monden et al. [1] proposed watermarking scheme that embeds arbitrary character sequence to the target method in a Java classfiles. But the scheme can be only used to embed the same watermark to each user’s classfiles.
Kazuhide Fukushima, Kouichi Sakurai
openaire   +1 more source

A Tutorial on Software Obfuscation

Adv. Comput., 2018
Sebastian Banescu, Alexander Pretschner
openaire   +2 more sources

Obfuscator-LLVM -- Software Protection for the Masses

2015 IEEE/ACM 1st International Workshop on Software Protection, 2015
Pascal Junod   +3 more
openaire   +1 more source

Measuring Software Obfuscation Quality–A Systematic Literature Review

IEEE Access, 2021
Shouki A Ebad, Abdulbasit A Darem
exaly  

Secure and Energy-Efficient Network Topology Obfuscation for Software-Defined WSNs

IEEE Internet of Things Journal, 2023
Manaf Bin-Yahya, Xuemin Shen
exaly  

Protecting Software through Obfuscation

ACM Computing Surveys, 2017
Sebastian Schrittwieser   +2 more
exaly  

Diversification and obfuscation techniques for software security: A systematic literature review

Information and Software Technology, 2018
Shohreh Hosseinzadeh   +2 more
exaly  

Home - About - Disclaimer - Privacy