Results 11 to 20 of about 22,093 (250)
Language and Obfuscation Oblivious Source Code Authorship Attribution [PDF]
Source Code Authorship Attribution can answer many interesting questions such as: Who wrote the malicious source code? Is the source code plagiarized, and does it infringe on copyright?
Sarim Zafar +3 more
doaj +2 more sources
Obfuscapk: An open-source black-box obfuscation tool for Android apps
Obfuscapk is an open-source automatic obfuscation tool for Android apps that works in a black-box fashion (i.e., it does not need the app source code).
Simone Aonzo +3 more
doaj +1 more source
Despite decades of research, the automatic detection of vulnerabilities in mobile apps remains an open challenge. Among the possible solutions, SAST tools uncover source or compiled code security flaws without needing the app to be executed and tested in
Francesco Pagano +4 more
doaj +1 more source
Partial Evaluation for Java Malware Detection [PDF]
The fact that Java is platform independent gives hackers the opportunity to write exploits that can target users on any platform, which has a JVM implementation. Metasploit is a well-known source of Java exploits and to circumvent detection by Anti Virus
A Flexeder +6 more
core +1 more source
PowerDrive: Accurate De-Obfuscation and Analysis of PowerShell Malware [PDF]
PowerShell is nowadays a widely-used technology to administrate and manage Windows-based operating systems. However, it is also extensively used by malware vectors to execute payloads or drop additional malicious contents.
Cara, Fabrizio +3 more
core +2 more sources
Partial Evaluation of String Obfuscations for Java Malware Detection [PDF]
The fact that Java is platform independent gives hackers the opportunity to write exploits that can target users on any platform, which has a JVM implementation. Metasploit is a well-known source of Javaexploits and to circumvent detection by Anti Virus (
Chawdhary, Aziem +2 more
core +1 more source
Search for malicious powershell scripts using syntax trees
Purpose of the paper: a search for a rather abstract representation of the PowerShell script functionality using abstract syntax trees such that an invisible obfuscated PowerShell script can be detected provided the associated PowerShell script is ...
Viktor V. Erokhin
doaj +1 more source
A large study on the effect of code obfuscation on the quality of java code [PDF]
Context: Obfuscation is a common technique used to protect software against malicious reverse engineering. Obfuscators manipulate the source code to make it harder to analyze and more difficult to understand for the attacker.
Boldyreff, Cornelia +7 more
core +4 more sources
Similarity of Source Code in the Presence of Pervasive Modifications [PDF]
Source code analysis to detect code cloning, code plagiarism, and code reuse suffers from the problem of pervasive code modifications, i.e. transformations that may have a global effect.
Clark, D, Krinke, J, Ragkhitwetsagul, C
core +1 more source
Software watermarking scheme with cloud computing constraints
A non-equivalent semantic obfuscation-based software watermarking,scheme was introduced to satisfy the demands of software intellectual property breaches in cloud.Via obfuscated source codes,part of semantics was cut into a recovery module to make the ...
Guang SUN +6 more
doaj +3 more sources

