Results 211 to 220 of about 22,093 (250)

HabitSense: A Privacy-Aware, AI-Enhanced Multimodal Wearable Platform for mHealth Applications. [PDF]

open access: yesProc ACM Interact Mob Wearable Ubiquitous Technol
Fernandes GJ   +11 more
europepmc   +1 more source

Design of an Automated Framework for Applying Generative AI-Based Source Code Obfuscation Techniques

open access: yesJournal of the Korea Society of Computer and Information
Jihun Han   +7 more
openaire   +1 more source

DeepObfusCode: Source Code Obfuscation through Sequence-to-Sequence Networks [PDF]

open access: yesLecture Notes in Networks and Systems, 2021
Accepted in Advances in Intelligent Systems and Computing 2021 & Computing Conference ...
exaly   +3 more sources

The effectiveness of source code obfuscation: An experimental assessment [PDF]

open access: yes2009 IEEE 17th International Conference on Program Comprehension, 2009
Source code obfuscation is a protection mechanism widely used to limit the possibility of malicious reverse engineering or attack activities on a software system. Although several code obfuscation techniques and tools are available, little knowledge is available about the capability of obfuscation to reduce attackers' efficiency, and the contexts in ...
Mariano Ceccato   +2 more
exaly   +4 more sources
Some of the next articles are maybe not open access.

Related searches:

Source Code Obfuscation for Smart Contracts

2020 27th Asia-Pacific Software Engineering Conference (APSEC), 2020
State-of-the-art work of evaluating smart contract static analysis tools faces a major problem: most test cases (i.e., labeled buggy contracts) are too simple and lack complexity, which makes the evaluation unable to show the real performance of the analysis tools when complex contracts are analyzed.
Meng Zhang   +3 more
openaire   +1 more source

An(other) Exercise in Measuring the Strength of Source Code Obfuscation

2014 25th International Workshop on Database and Expert Systems Applications, 2014
We experimentally compare the strength of different source code obfuscation techniques by measuring the performance of human analysts. We describe an experimental setup by which it is possible to compare different obfuscation techniques with each other.
Yan Zhuang, Tilo Müller
exaly   +2 more sources

Home - About - Disclaimer - Privacy