Results 21 to 30 of about 21,953 (219)

Partial Evaluation of String Obfuscations for Java Malware Detection [PDF]

open access: yes, 2016
The fact that Java is platform independent gives hackers the opportunity to write exploits that can target users on any platform, which has a JVM implementation. Metasploit is a well-known source of Javaexploits and to circumvent detection by Anti Virus (
Chawdhary, Aziem   +2 more
core   +1 more source

Similarity of Source Code in the Presence of Pervasive Modifications [PDF]

open access: yes, 2016
Source code analysis to detect code cloning, code plagiarism, and code reuse suffers from the problem of pervasive code modifications, i.e. transformations that may have a global effect.
Clark, D, Krinke, J, Ragkhitwetsagul, C
core   +1 more source

Software watermarking scheme with cloud computing constraints

open access: yes网络与信息安全学报, 2016
A non-equivalent semantic obfuscation-based software watermarking,scheme was introduced to satisfy the demands of software intellectual property breaches in cloud.Via obfuscated source codes,part of semantics was cut into a recovery module to make the ...
Guang SUN   +6 more
doaj   +3 more sources

Protecting Android Devices From Malware Attacks: A State-of-the-Art Report of Concepts, Modern Learning Models and Challenges

open access: yesIEEE Access, 2023
Advancements in microelectronics have increased the popularity of mobile devices like cellphones, tablets, e-readers, and PDAs. Android, with its open-source platform, broad device support, customizability, and integration with the Google ecosystem, has ...
Esra Calik Bayazit   +2 more
doaj   +1 more source

JSBiRTH: Dynamic javascript birthmark based on the run-time heap [PDF]

open access: yes, 2011
JavaScript is currently the dominating client-side scripting language in the web community. However, the source code of JavaScript can be easily copied through a browser. The intellectual property right of the developers lacks protection.
Chan, PPF, Hui, LCK, Yiu, SM
core   +1 more source

Hybrid Obfuscation Using Signals and Encryption

open access: yesJournal of Computer Networks and Communications, 2018
Obfuscation of software and data is one of the subcategories of software security. Hence, the outlines of the obfuscation problem and its various methods have been studied in this article.
Bahare Hashemzade, Ali Maroosi
doaj   +1 more source

Unleashing the power of pseudo-code for binary code similarity analysis

open access: yesCybersecurity, 2022
Code similarity analysis has become more popular due to its significant applicantions, including vulnerability detection, malware detection, and patch analysis. Since the source code of the software is difficult to obtain under most circumstances, binary-
Weiwei Zhang   +3 more
doaj   +1 more source

Understanding Android Obfuscation Techniques: A Large-Scale Investigation in the Wild [PDF]

open access: yes, 2018
In this paper, we seek to better understand Android obfuscation and depict a holistic view of the usage of obfuscation through a large-scale investigation in the wild.
Chen, Kai   +9 more
core   +2 more sources

Implementation of Obfuscation Technique on PHP Source Code

open access: yesProceeding of the Electrical Engineering Computer Science and Informatics, 2018
Source code on web based applications can be altered easily. This occurred because the source code is not compiled into an executable file. Hence, it can be read and copied easily, or be changed without permission from the author. Obfuscation is a technique that commonly used to secure the source code in any websites based application. Obfuscation is a
Maskur Maskur   +2 more
openaire   +2 more sources

Obfuscation-based malware update: A comparison of manual and automated methods [PDF]

open access: yes, 2017
Indexación: Scopus; Web of Science.This research presents a proposal of malware classification and its update based on capacity and obfuscation. This article is an extension of [4]a, and describes the procedure for malware updating, that is, to take ...
Barría, C.   +4 more
core   +2 more sources

Home - About - Disclaimer - Privacy