Results 21 to 30 of about 21,953 (219)
Partial Evaluation of String Obfuscations for Java Malware Detection [PDF]
The fact that Java is platform independent gives hackers the opportunity to write exploits that can target users on any platform, which has a JVM implementation. Metasploit is a well-known source of Javaexploits and to circumvent detection by Anti Virus (
Chawdhary, Aziem +2 more
core +1 more source
Similarity of Source Code in the Presence of Pervasive Modifications [PDF]
Source code analysis to detect code cloning, code plagiarism, and code reuse suffers from the problem of pervasive code modifications, i.e. transformations that may have a global effect.
Clark, D, Krinke, J, Ragkhitwetsagul, C
core +1 more source
Software watermarking scheme with cloud computing constraints
A non-equivalent semantic obfuscation-based software watermarking,scheme was introduced to satisfy the demands of software intellectual property breaches in cloud.Via obfuscated source codes,part of semantics was cut into a recovery module to make the ...
Guang SUN +6 more
doaj +3 more sources
Advancements in microelectronics have increased the popularity of mobile devices like cellphones, tablets, e-readers, and PDAs. Android, with its open-source platform, broad device support, customizability, and integration with the Google ecosystem, has ...
Esra Calik Bayazit +2 more
doaj +1 more source
JSBiRTH: Dynamic javascript birthmark based on the run-time heap [PDF]
JavaScript is currently the dominating client-side scripting language in the web community. However, the source code of JavaScript can be easily copied through a browser. The intellectual property right of the developers lacks protection.
Chan, PPF, Hui, LCK, Yiu, SM
core +1 more source
Hybrid Obfuscation Using Signals and Encryption
Obfuscation of software and data is one of the subcategories of software security. Hence, the outlines of the obfuscation problem and its various methods have been studied in this article.
Bahare Hashemzade, Ali Maroosi
doaj +1 more source
Unleashing the power of pseudo-code for binary code similarity analysis
Code similarity analysis has become more popular due to its significant applicantions, including vulnerability detection, malware detection, and patch analysis. Since the source code of the software is difficult to obtain under most circumstances, binary-
Weiwei Zhang +3 more
doaj +1 more source
Understanding Android Obfuscation Techniques: A Large-Scale Investigation in the Wild [PDF]
In this paper, we seek to better understand Android obfuscation and depict a holistic view of the usage of obfuscation through a large-scale investigation in the wild.
Chen, Kai +9 more
core +2 more sources
Implementation of Obfuscation Technique on PHP Source Code
Source code on web based applications can be altered easily. This occurred because the source code is not compiled into an executable file. Hence, it can be read and copied easily, or be changed without permission from the author. Obfuscation is a technique that commonly used to secure the source code in any websites based application. Obfuscation is a
Maskur Maskur +2 more
openaire +2 more sources
Obfuscation-based malware update: A comparison of manual and automated methods [PDF]
Indexación: Scopus; Web of Science.This research presents a proposal of malware classification and its update based on capacity and obfuscation. This article is an extension of [4]a, and describes the procedure for malware updating, that is, to take ...
Barría, C. +4 more
core +2 more sources

