Results 11 to 20 of about 21,953 (219)

Deoptfuscator: Defeating Advanced Control-Flow Obfuscation Using Android Runtime (ART)

open access: yesIEEE Access, 2022
Code obfuscation is a technique that makes it difficult for code analyzers to understand a program by transforming its structures or operations while maintaining its original functionality.
Geunha You   +4 more
doaj   +1 more source

The effectiveness of source code obfuscation: An experimental assessment [PDF]

open access: yes2009 IEEE 17th International Conference on Program Comprehension, 2009
Source code obfuscation is a protection mechanism widely used to limit the possibility of malicious reverse engineering or attack activities on a software system. Although several code obfuscation techniques and tools are available, little knowledge is available about the capability of obfuscation to reduce attackers' efficiency, and the contexts in ...
MARIANO CECCATO   +6 more
openaire   +3 more sources

Obfuscapk: An open-source black-box obfuscation tool for Android apps

open access: yesSoftwareX, 2020
Obfuscapk is an open-source automatic obfuscation tool for Android apps that works in a black-box fashion (i.e., it does not need the app source code).
Simone Aonzo   +3 more
doaj   +1 more source

DeepObfusCode: Source Code Obfuscation through Sequence-to-Sequence Networks [PDF]

open access: yes, 2021
Accepted in Advances in Intelligent Systems and Computing 2021 & Computing Conference ...
openaire   +2 more sources

SEBASTiAn: A static and extensible black-box application security testing tool for iOS and Android applications

open access: yesSoftwareX, 2023
Despite decades of research, the automatic detection of vulnerabilities in mobile apps remains an open challenge. Among the possible solutions, SAST tools uncover source or compiled code security flaws without needing the app to be executed and tested in
Francesco Pagano   +4 more
doaj   +1 more source

Partial Evaluation for Java Malware Detection [PDF]

open access: yes, 2015
The fact that Java is platform independent gives hackers the opportunity to write exploits that can target users on any platform, which has a JVM implementation. Metasploit is a well-known source of Java exploits and to circumvent detection by Anti Virus
A Flexeder   +6 more
core   +1 more source

A large study on the effect of code obfuscation on the quality of java code [PDF]

open access: yes, 2014
Context: Obfuscation is a common technique used to protect software against malicious reverse engineering. Obfuscators manipulate the source code to make it harder to analyze and more difficult to understand for the attacker.
Boldyreff, Cornelia   +7 more
core   +4 more sources

Obscuring Mobile Agents by Source Code Obfuscation

open access: yesInternational Journal of Computer Applications, 2013
Security and performance are most essential and prime challenges for networking phenomenon. Computation on the remote host is generally done through links. Thus security is needed when the code is on the way to the destination host. A program travelling over the link is extremely venerable to be forged for malfunctioning.
Atul Mishra, Atul Srivastava, Veena Garg
openaire   +1 more source

PowerDrive: Accurate De-Obfuscation and Analysis of PowerShell Malware [PDF]

open access: yes, 2019
PowerShell is nowadays a widely-used technology to administrate and manage Windows-based operating systems. However, it is also extensively used by malware vectors to execute payloads or drop additional malicious contents.
Cara, Fabrizio   +3 more
core   +2 more sources

Search for malicious powershell scripts using syntax trees

open access: yesБезопасность информационных технологий, 2023
Purpose of the paper: a search for a rather abstract representation of the PowerShell script functionality using abstract syntax trees such that an invisible obfuscated PowerShell script can be detected provided the associated PowerShell script is ...
Viktor V. Erokhin
doaj   +1 more source

Home - About - Disclaimer - Privacy