Results 31 to 40 of about 19,937 (276)

A Comprehensive Analysis of Software Obfuscation Techniques

open access: yesInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology, 2023
In today's environment, a huge and increasing range of unauthorised practises allows hackers to get unauthorised access to devices and private information by inserting harmful code. The purpose of this research is to assess the efficiency of obfuscation strategies in safeguarding software against reverse engineering and tampering.
null Priyanka Kadam   +2 more
openaire   +1 more source

Revisiting software protection [PDF]

open access: yes, 2003
We provide a selective survey on software protection, including approaches to software tamper resistance, obfuscation, software diversity, and white-box cryptography.
A. Herzberg   +25 more
core   +2 more sources

Hardware and Software Methods for Secure Obfuscation and Deobfuscation: An In-Depth Analysis

open access: yesComputers
The swift evolution of information technology and growing connectivity in critical applications have elevated cybersecurity, protecting and certifying software and designs against rising cyber threats.
Khaled Saleh   +4 more
doaj   +1 more source

CodeTrolley: Hardware-Assisted Control Flow Obfuscation [PDF]

open access: yes, 2019
Many cybersecurity attacks rely on analyzing a binary executable to find exploitable sections of code. Code obfuscation is used to prevent attackers from reverse engineering these executables.
Boskov, Novak   +2 more
core   +1 more source

PowerDrive: Accurate De-Obfuscation and Analysis of PowerShell Malware [PDF]

open access: yes, 2019
PowerShell is nowadays a widely-used technology to administrate and manage Windows-based operating systems. However, it is also extensively used by malware vectors to execute payloads or drop additional malicious contents.
Cara, Fabrizio   +3 more
core   +2 more sources

Titanium Suboxides Responsible for Electronic Anomaly Near Room Temperature in the Ti3C2Tx MXene

open access: yesAdvanced Functional Materials, EarlyView.
Our multi‐technique study reveals that the near‐room‐temperature anomaly in Ti3C2Tx MXene is linked to titanium suboxide nanodomains, including Ti3O5, embedded within the MXene host. Their temperature‐driven transformation provides an alternative explanation to solvent‐ and swelling‐based models and offers new insight into the thermally activated ...
Bence G. Márkus   +8 more
wiley   +1 more source

Stealthy Opaque Predicates in Hardware - Obfuscating Constant Expressions at Negligible Overhead

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2018
Opaque predicates are a well-established fundamental building block for software obfuscation. Simplified, an opaque predicate implements an expression that provides constant Boolean output, but appears to have dynamic behavior for static analysis.
Max Hoffmann, Christof Paar
doaj   +1 more source

Method of diversity software protection based on fusion compilation

open access: yes网络与信息安全学报, 2020
For the obvious characteristics and single mode of the existing common protection methods, with the help of the LLVM framework, a diversity software protection method based on fusion compilation was proposed.
XIONG Xiaobing, SHU Hui, KANG Fei
doaj   +3 more sources

BBDetector: A Precise and Scalable Third-Party Library Detection in Binary Executables with Fine-Grained Function-Level Features

open access: yesApplied Sciences, 2022
Third-party library (TPL) reuse may introduce vulnerable or malicious code and expose the software, which exposes them to potential risks. Thus, it is essential to identify third-party dependencies and take immediate corrective action to fix critical ...
Xiaoya Zhu   +4 more
doaj   +1 more source

Partial-indistinguishability obfuscation using braids [PDF]

open access: yes, 2014
An obfuscator is an algorithm that translates circuits into functionally-equivalent similarly-sized circuits that are hard to understand. Efficient obfuscators would have many applications in cryptography.
Alagic, Gorjan   +2 more
core   +2 more sources

Home - About - Disclaimer - Privacy