Results 11 to 20 of about 22,093 (250)

Language and Obfuscation Oblivious Source Code Authorship Attribution [PDF]

open access: yesIEEE Access, 2020
Source Code Authorship Attribution can answer many interesting questions such as: Who wrote the malicious source code? Is the source code plagiarized, and does it infringe on copyright?
Sarim Zafar   +3 more
doaj   +2 more sources

Obfuscapk: An open-source black-box obfuscation tool for Android apps

open access: yesSoftwareX, 2020
Obfuscapk is an open-source automatic obfuscation tool for Android apps that works in a black-box fashion (i.e., it does not need the app source code).
Simone Aonzo   +3 more
doaj   +1 more source

SEBASTiAn: A static and extensible black-box application security testing tool for iOS and Android applications

open access: yesSoftwareX, 2023
Despite decades of research, the automatic detection of vulnerabilities in mobile apps remains an open challenge. Among the possible solutions, SAST tools uncover source or compiled code security flaws without needing the app to be executed and tested in
Francesco Pagano   +4 more
doaj   +1 more source

Partial Evaluation for Java Malware Detection [PDF]

open access: yes, 2015
The fact that Java is platform independent gives hackers the opportunity to write exploits that can target users on any platform, which has a JVM implementation. Metasploit is a well-known source of Java exploits and to circumvent detection by Anti Virus
A Flexeder   +6 more
core   +1 more source

PowerDrive: Accurate De-Obfuscation and Analysis of PowerShell Malware [PDF]

open access: yes, 2019
PowerShell is nowadays a widely-used technology to administrate and manage Windows-based operating systems. However, it is also extensively used by malware vectors to execute payloads or drop additional malicious contents.
Cara, Fabrizio   +3 more
core   +2 more sources

Partial Evaluation of String Obfuscations for Java Malware Detection [PDF]

open access: yes, 2016
The fact that Java is platform independent gives hackers the opportunity to write exploits that can target users on any platform, which has a JVM implementation. Metasploit is a well-known source of Javaexploits and to circumvent detection by Anti Virus (
Chawdhary, Aziem   +2 more
core   +1 more source

Search for malicious powershell scripts using syntax trees

open access: yesБезопасность информационных технологий, 2023
Purpose of the paper: a search for a rather abstract representation of the PowerShell script functionality using abstract syntax trees such that an invisible obfuscated PowerShell script can be detected provided the associated PowerShell script is ...
Viktor V. Erokhin
doaj   +1 more source

A large study on the effect of code obfuscation on the quality of java code [PDF]

open access: yes, 2014
Context: Obfuscation is a common technique used to protect software against malicious reverse engineering. Obfuscators manipulate the source code to make it harder to analyze and more difficult to understand for the attacker.
Boldyreff, Cornelia   +7 more
core   +4 more sources

Similarity of Source Code in the Presence of Pervasive Modifications [PDF]

open access: yes, 2016
Source code analysis to detect code cloning, code plagiarism, and code reuse suffers from the problem of pervasive code modifications, i.e. transformations that may have a global effect.
Clark, D, Krinke, J, Ragkhitwetsagul, C
core   +1 more source

Software watermarking scheme with cloud computing constraints

open access: yes网络与信息安全学报, 2016
A non-equivalent semantic obfuscation-based software watermarking,scheme was introduced to satisfy the demands of software intellectual property breaches in cloud.Via obfuscated source codes,part of semantics was cut into a recovery module to make the ...
Guang SUN   +6 more
doaj   +3 more sources

Home - About - Disclaimer - Privacy