Results 221 to 230 of about 22,093 (250)

Implementation of Obfuscation Technique on PHP Source Code

open access: yesProceeding of the Electrical Engineering Computer Science and Informatics, 2018
Source code on web based applications can be altered easily. This occurred because the source code is not compiled into an executable file. Hence, it can be read and copied easily, or be changed without permission from the author. Obfuscation is a technique that commonly used to secure the source code in any websites based application. Obfuscation is a
Maskur Maskur
exaly   +3 more sources

A family of experiments to assess the effectiveness and efficiency of source code obfuscation techniques [PDF]

open access: yesEmpirical Software Engineering, 2013
Context: code obfuscation is intended to obstruct code understanding and, eventually, to delay malicious code changes and ultimately render it uneconomical. Although code understanding cannot be completely impeded, code obfuscation makes it more laborious and troublesome, so as to discourage or retard code tampering.
Mariano Ceccato   +2 more
exaly   +6 more sources

Implementation of an Obfuscation Tool for C/C++ Source Code Protection on the XScale Architecture [PDF]

open access: yesLecture Notes in Computer Science, 2008
Obfuscation is one of the most effective methods to protect software against malicious reverse engineering intentionally making the code more complex and confusing. In this paper, we implement and evaluate an obfuscation tool, or obfuscatorfor protecting the intellectual property of C/C++ source code. That is, this paper presents an implementation of a
Yookun Cho
exaly   +2 more sources
Some of the next articles are maybe not open access.

Related searches:

PHP Source Code Protection Using Layout Obfuscation and AES-256 Encryption Algorithm

2021 6th International Workshop on Big Data and Information Security (IWBIS), 2021
Herman Kabetta
exaly   +2 more sources

Mechanisms for Source Code Obfuscation in C: Novel Techniques and Implementation

2020 International Conference on Emerging Smart Computing and Informatics (ESCI), 2020
Due to exponential growth of internet, there is abundant assistance available online to learn programming languages much more efficiently. Most of the programmers use this valuable knowledge for the constructive purpose, whereas some of them are using this for the illegal means like unethical hacking, code spoofing, reverse engineering and many more ...
Jibi Abraham
exaly   +2 more sources

Plain Source Code Obfuscation as an Effective Attack Method on IoT Malware Image Classification

2023 IEEE 47th Annual Computers, Software, and Applications Conference (COMPSAC), 2023
Hiroshi Inamura, Shigemi Ishida
exaly   +2 more sources

Efficient behavioral intellectual properties source code obfuscation for high-level synthesis

2017 18th IEEE Latin American Test Symposium (LATS), 2017
Obfuscation is an easy and inexpensive way to protect Intellectual Property (IP). When obfuscating an IP, a functional equivalent source file is generated, which is virtually impossible for humans to understand and extremely difficult to reverse-engineer.
Nandeesha Veeranna   +1 more
exaly   +2 more sources

Technique of source code obfuscation based on data flow and control flow tansformations

2012 7th International Conference on Computer Science & Education (ICCSE), 2012
This paper mainly present a solution to cross platform problem about the obfuscation in C/C++ source code, and describe the principle and performance of source code obfuscation algorithm, such as layout obfuscation, data flow obfuscation and control structure flow obfuscation.
Su Qing   +4 more
exaly   +2 more sources

Improving Security Level through Obfuscation Technique for Source Code Protection using AES Algorithm

Proceedings of the 2017 7th International Conference on Communication and Network Security, 2017
PHP is a server-side scripting programming language that is widely used to develop website services. However, web-based PHP applications are distributed in source code so that the security is vulnerable and weak because the lines of source code can be easily copied, modified, or used in other applications.
Romi Nur Ismanto, Muhammad Salman
openaire   +1 more source

Source Code Obfuscation Assessment Techniques for Remote Financial Services

2024 17th International Conference on Management of Large-Scale System Development (MLSD)
Natalia Bespalova, Pavel Bylevsky
exaly   +2 more sources

Home - About - Disclaimer - Privacy