Results 11 to 20 of about 21,953 (219)
Deoptfuscator: Defeating Advanced Control-Flow Obfuscation Using Android Runtime (ART)
Code obfuscation is a technique that makes it difficult for code analyzers to understand a program by transforming its structures or operations while maintaining its original functionality.
Geunha You +4 more
doaj +1 more source
The effectiveness of source code obfuscation: An experimental assessment [PDF]
Source code obfuscation is a protection mechanism widely used to limit the possibility of malicious reverse engineering or attack activities on a software system. Although several code obfuscation techniques and tools are available, little knowledge is available about the capability of obfuscation to reduce attackers' efficiency, and the contexts in ...
MARIANO CECCATO +6 more
openaire +3 more sources
Obfuscapk: An open-source black-box obfuscation tool for Android apps
Obfuscapk is an open-source automatic obfuscation tool for Android apps that works in a black-box fashion (i.e., it does not need the app source code).
Simone Aonzo +3 more
doaj +1 more source
DeepObfusCode: Source Code Obfuscation through Sequence-to-Sequence Networks [PDF]
Accepted in Advances in Intelligent Systems and Computing 2021 & Computing Conference ...
openaire +2 more sources
Despite decades of research, the automatic detection of vulnerabilities in mobile apps remains an open challenge. Among the possible solutions, SAST tools uncover source or compiled code security flaws without needing the app to be executed and tested in
Francesco Pagano +4 more
doaj +1 more source
Partial Evaluation for Java Malware Detection [PDF]
The fact that Java is platform independent gives hackers the opportunity to write exploits that can target users on any platform, which has a JVM implementation. Metasploit is a well-known source of Java exploits and to circumvent detection by Anti Virus
A Flexeder +6 more
core +1 more source
A large study on the effect of code obfuscation on the quality of java code [PDF]
Context: Obfuscation is a common technique used to protect software against malicious reverse engineering. Obfuscators manipulate the source code to make it harder to analyze and more difficult to understand for the attacker.
Boldyreff, Cornelia +7 more
core +4 more sources
Obscuring Mobile Agents by Source Code Obfuscation
Security and performance are most essential and prime challenges for networking phenomenon. Computation on the remote host is generally done through links. Thus security is needed when the code is on the way to the destination host. A program travelling over the link is extremely venerable to be forged for malfunctioning.
Atul Mishra, Atul Srivastava, Veena Garg
openaire +1 more source
PowerDrive: Accurate De-Obfuscation and Analysis of PowerShell Malware [PDF]
PowerShell is nowadays a widely-used technology to administrate and manage Windows-based operating systems. However, it is also extensively used by malware vectors to execute payloads or drop additional malicious contents.
Cara, Fabrizio +3 more
core +2 more sources
Search for malicious powershell scripts using syntax trees
Purpose of the paper: a search for a rather abstract representation of the PowerShell script functionality using abstract syntax trees such that an invisible obfuscated PowerShell script can be detected provided the associated PowerShell script is ...
Viktor V. Erokhin
doaj +1 more source

