Results 31 to 40 of about 19,937 (276)
A Comprehensive Analysis of Software Obfuscation Techniques
In today's environment, a huge and increasing range of unauthorised practises allows hackers to get unauthorised access to devices and private information by inserting harmful code. The purpose of this research is to assess the efficiency of obfuscation strategies in safeguarding software against reverse engineering and tampering.
null Priyanka Kadam +2 more
openaire +1 more source
Revisiting software protection [PDF]
We provide a selective survey on software protection, including approaches to software tamper resistance, obfuscation, software diversity, and white-box cryptography.
A. Herzberg +25 more
core +2 more sources
Hardware and Software Methods for Secure Obfuscation and Deobfuscation: An In-Depth Analysis
The swift evolution of information technology and growing connectivity in critical applications have elevated cybersecurity, protecting and certifying software and designs against rising cyber threats.
Khaled Saleh +4 more
doaj +1 more source
CodeTrolley: Hardware-Assisted Control Flow Obfuscation [PDF]
Many cybersecurity attacks rely on analyzing a binary executable to find exploitable sections of code. Code obfuscation is used to prevent attackers from reverse engineering these executables.
Boskov, Novak +2 more
core +1 more source
PowerDrive: Accurate De-Obfuscation and Analysis of PowerShell Malware [PDF]
PowerShell is nowadays a widely-used technology to administrate and manage Windows-based operating systems. However, it is also extensively used by malware vectors to execute payloads or drop additional malicious contents.
Cara, Fabrizio +3 more
core +2 more sources
Titanium Suboxides Responsible for Electronic Anomaly Near Room Temperature in the Ti3C2Tx MXene
Our multi‐technique study reveals that the near‐room‐temperature anomaly in Ti3C2Tx MXene is linked to titanium suboxide nanodomains, including Ti3O5, embedded within the MXene host. Their temperature‐driven transformation provides an alternative explanation to solvent‐ and swelling‐based models and offers new insight into the thermally activated ...
Bence G. Márkus +8 more
wiley +1 more source
Stealthy Opaque Predicates in Hardware - Obfuscating Constant Expressions at Negligible Overhead
Opaque predicates are a well-established fundamental building block for software obfuscation. Simplified, an opaque predicate implements an expression that provides constant Boolean output, but appears to have dynamic behavior for static analysis.
Max Hoffmann, Christof Paar
doaj +1 more source
Method of diversity software protection based on fusion compilation
For the obvious characteristics and single mode of the existing common protection methods, with the help of the LLVM framework, a diversity software protection method based on fusion compilation was proposed.
XIONG Xiaobing, SHU Hui, KANG Fei
doaj +3 more sources
Third-party library (TPL) reuse may introduce vulnerable or malicious code and expose the software, which exposes them to potential risks. Thus, it is essential to identify third-party dependencies and take immediate corrective action to fix critical ...
Xiaoya Zhu +4 more
doaj +1 more source
Partial-indistinguishability obfuscation using braids [PDF]
An obfuscator is an algorithm that translates circuits into functionally-equivalent similarly-sized circuits that are hard to understand. Efficient obfuscators would have many applications in cryptography.
Alagic, Gorjan +2 more
core +2 more sources

