Implementation of Obfuscation Technique on PHP Source Code
Source code on web based applications can be altered easily. This occurred because the source code is not compiled into an executable file. Hence, it can be read and copied easily, or be changed without permission from the author. Obfuscation is a technique that commonly used to secure the source code in any websites based application. Obfuscation is a
Maskur Maskur
exaly +3 more sources
A family of experiments to assess the effectiveness and efficiency of source code obfuscation techniques [PDF]
Context: code obfuscation is intended to obstruct code understanding and, eventually, to delay malicious code changes and ultimately render it uneconomical. Although code understanding cannot be completely impeded, code obfuscation makes it more laborious and troublesome, so as to discourage or retard code tampering.
Mariano Ceccato +2 more
exaly +6 more sources
Implementation of an Obfuscation Tool for C/C++ Source Code Protection on the XScale Architecture [PDF]
Obfuscation is one of the most effective methods to protect software against malicious reverse engineering intentionally making the code more complex and confusing. In this paper, we implement and evaluate an obfuscation tool, or obfuscatorfor protecting the intellectual property of C/C++ source code. That is, this paper presents an implementation of a
Yookun Cho
exaly +2 more sources
Related searches:
PHP Source Code Protection Using Layout Obfuscation and AES-256 Encryption Algorithm
2021 6th International Workshop on Big Data and Information Security (IWBIS), 2021Herman Kabetta
exaly +2 more sources
Mechanisms for Source Code Obfuscation in C: Novel Techniques and Implementation
2020 International Conference on Emerging Smart Computing and Informatics (ESCI), 2020Due to exponential growth of internet, there is abundant assistance available online to learn programming languages much more efficiently. Most of the programmers use this valuable knowledge for the constructive purpose, whereas some of them are using this for the illegal means like unethical hacking, code spoofing, reverse engineering and many more ...
Jibi Abraham
exaly +2 more sources
Plain Source Code Obfuscation as an Effective Attack Method on IoT Malware Image Classification
2023 IEEE 47th Annual Computers, Software, and Applications Conference (COMPSAC), 2023Hiroshi Inamura, Shigemi Ishida
exaly +2 more sources
Efficient behavioral intellectual properties source code obfuscation for high-level synthesis
2017 18th IEEE Latin American Test Symposium (LATS), 2017Obfuscation is an easy and inexpensive way to protect Intellectual Property (IP). When obfuscating an IP, a functional equivalent source file is generated, which is virtually impossible for humans to understand and extremely difficult to reverse-engineer.
Nandeesha Veeranna +1 more
exaly +2 more sources
Technique of source code obfuscation based on data flow and control flow tansformations
2012 7th International Conference on Computer Science & Education (ICCSE), 2012This paper mainly present a solution to cross platform problem about the obfuscation in C/C++ source code, and describe the principle and performance of source code obfuscation algorithm, such as layout obfuscation, data flow obfuscation and control structure flow obfuscation.
Su Qing +4 more
exaly +2 more sources
PHP is a server-side scripting programming language that is widely used to develop website services. However, web-based PHP applications are distributed in source code so that the security is vulnerable and weak because the lines of source code can be easily copied, modified, or used in other applications.
Romi Nur Ismanto, Muhammad Salman
openaire +1 more source
Source Code Obfuscation Assessment Techniques for Remote Financial Services
2024 17th International Conference on Management of Large-Scale System Development (MLSD)Natalia Bespalova, Pavel Bylevsky
exaly +2 more sources

