Hybrid MLOps framework for automated lifecycle management of adaptive phishing detection models. [PDF]
Reda A, Taie SA, Shaheen ME.
europepmc +1 more source
HabitSense: A Privacy-Aware, AI-Enhanced Multimodal Wearable Platform for mHealth Applications. [PDF]
Fernandes GJ +11 more
europepmc +1 more source
Design of an Automated Framework for Applying Generative AI-Based Source Code Obfuscation Techniques
Jihun Han +7 more
openaire +1 more source
A robust and dynamic malware detection and classification model using behavioral-based analysis and BERT technique. [PDF]
Alhazmi AH.
europepmc +1 more source
MSSA: multi-stage semantic-aware neural network for binary code similarity detection. [PDF]
Wan B, Zhou J, Wang Y, Chen F, Qian Y.
europepmc +1 more source
DeepObfusCode: Source Code Obfuscation through Sequence-to-Sequence Networks [PDF]
Accepted in Advances in Intelligent Systems and Computing 2021 & Computing Conference ...
exaly +3 more sources
The effectiveness of source code obfuscation: An experimental assessment [PDF]
Source code obfuscation is a protection mechanism widely used to limit the possibility of malicious reverse engineering or attack activities on a software system. Although several code obfuscation techniques and tools are available, little knowledge is available about the capability of obfuscation to reduce attackers' efficiency, and the contexts in ...
Mariano Ceccato +2 more
exaly +4 more sources
Related searches:
Source Code Obfuscation for Smart Contracts
2020 27th Asia-Pacific Software Engineering Conference (APSEC), 2020State-of-the-art work of evaluating smart contract static analysis tools faces a major problem: most test cases (i.e., labeled buggy contracts) are too simple and lack complexity, which makes the evaluation unable to show the real performance of the analysis tools when complex contracts are analyzed.
Meng Zhang +3 more
openaire +1 more source
An(other) Exercise in Measuring the Strength of Source Code Obfuscation
2014 25th International Workshop on Database and Expert Systems Applications, 2014We experimentally compare the strength of different source code obfuscation techniques by measuring the performance of human analysts. We describe an experimental setup by which it is possible to compare different obfuscation techniques with each other.
Yan Zhuang, Tilo Müller
exaly +2 more sources

