Results 1 to 10 of about 21,944 (118)

Assessment of Source Code Obfuscation Techniques [PDF]

open access: yes, 2016
Obfuscation techniques are a general category of software protections widely adopted to prevent malicious tampering of the code by making applications more difficult to understand and thus harder to modify.
Leonardo Regano   +2 more
exaly   +4 more sources

Hybrid Obfuscation Technique to Protect Source Code From Prohibited Software Reverse Engineering

open access: yesIEEE Access, 2020
In this research, a new Hybrid Obfuscation Technique was proposed to prevent prohibited Reverse Engineering. The proposed hybrid technique contains three approaches; first approach is string encryption.
Asma'a Mahfoud Hezam Al-Hakimi   +4 more
doaj   +3 more sources

A Framework to Quantify the Quality of Source Code Obfuscation

open access: yesApplied Sciences
Malicious reverse engineering of software has served as a valuable technique for attackers to infringe upon and steal intellectual property. We can employ obfuscation techniques to protect against such attackers as useful tools to safeguard software ...
Hongjoo Jin   +4 more
doaj   +3 more sources

Locating Third-party Library Functions in Obfuscated Applications [PDF]

open access: yesJisuanji kexue, 2023
Third-party libraries are an important part of Android applications.When enforcing security enhancement or analysis based on application repackaging,it is often necessary to locate specific functions in third-party library.To this end,there is a need to ...
YUAN Jiangfeng, LI Haoxiang, YOU Wei, HUANG Jianjun, SHI Wenchang, LIANG Bin
doaj   +1 more source

The rise of obfuscated Android malware and impacts on detection methods [PDF]

open access: yesPeerJ Computer Science, 2022
The various application markets are facing an exponential growth of Android malware. Every day, thousands of new Android malware applications emerge. Android malware hackers adopt reverse engineering and repackage benign applications with their malicious
Wael F. Elsersy   +2 more
doaj   +2 more sources

Optimizing RTL Code Obfuscation: New Methods Based on XML Syntax Tree

open access: yesApplied Sciences, 2023
As the most widely used description code in digital circuits and system on chip (SoC), the security of register transfer level (RTL) code is extremely critical.
Hanwen Yi, Jin Zhang, Sheng Liu
doaj   +1 more source

C Source code Obfuscation using Hash Function and Encryption Algorithm

open access: yesIJCCS (Indonesian Journal of Computing and Cybernetics Systems), 2023
Obfuscation is a technique for transforming program code into a different form that is more difficult to understand. Several obfuscation methods are used to obfuscate source code, including dead code insertion, code transposition, and string encryption ...
Sarah Rosdiana Tambunan, Nur Rokhman
doaj   +1 more source

APIASO: A Novel API Call Obfuscation Technique Based on Address Space Obscurity

open access: yesApplied Sciences, 2023
API calls are programming interfaces used by applications. When it is difficult for an analyst to perform a direct reverse analysis of a program, the API provides an important basis for analyzing the behavior and functionality of the program. API address
Yang Li   +5 more
doaj   +1 more source

SCORE: Source Code Optimization & REconstruction

open access: yesIEEE Access, 2020
The main goal of obfuscation is to make software difficult to analyze. Although obfuscation is one useful method to protect programs, the ability to analyze malware is greatly reduced if used for malicious purposes.
Jae Hyuk Suk   +2 more
doaj   +1 more source

Deoptfuscator: Defeating Advanced Control-Flow Obfuscation Using Android Runtime (ART)

open access: yesIEEE Access, 2022
Code obfuscation is a technique that makes it difficult for code analyzers to understand a program by transforming its structures or operations while maintaining its original functionality.
Geunha You   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy