Results 31 to 40 of about 21,953 (219)
Achieving Obfuscation Through Self-Modifying Code: A Theoretical Model [PDF]
With the extreme amount of data and software available on networks, the protection of online information is one of the most important tasks of this technological age.
Waddell, Heidi
core +1 more source
An Android Malicious Code Detection Method Based on Improved DCA Algorithm
Recently, Android malicious code has increased dramatically and the technology of reinforcement is increasingly powerful. Due to the development of code obfuscation and polymorphic deformation technology, the current Android malicious code static ...
Chundong Wang +5 more
doaj +1 more source
Towards accurate detection of obfuscated web tracking [PDF]
Web tracking is currently recognized as one of the most important privacy threats on the Internet. Over the last years, many methodologies have been developed to uncover web trackers.
Barlet Ros, Pere +2 more
core +1 more source
Array Data Transformation For Source Code Obfuscation
{"references": ["Markus Dahm, \u00d4\u00c7\u00ffByte Code Engineering with the BCEL API- Technical\nReport B-17-98, April 3, 2001.", "Arjan de Roo, Leon van den Oord, \u00d4\u00c7\u00ffStealthy obfuscation techniques:\nmisleading the pirates-, Department of Computer Science, University of\nTwente Enschede, The Netherlands.", "Sharath.K.Udupa.Saumya K ...
S. Praveen, P. Sojan Lal
openaire +1 more source
CryptoKnight:generating and modelling compiled cryptographic primitives [PDF]
Cryptovirological augmentations present an immediate, incomparable threat. Over the last decade, the substantial proliferation of crypto-ransomware has had widespread consequences for consumers and organisations alike.
Bellekens, Xavier, Hill, Gregory
core +3 more sources
Program obfuscation is widely used to protect commercial software against reverse-engineering. However, an adversary can still download, disassemble and analyze binaries of the obfuscated code executed on an embedded System-on-Chip (SoC), and by correlating execution times to input values, extract secret information from the program.
Fell, Alexander +2 more
openaire +2 more sources
A comparison of code similarity analysers [PDF]
Copying and pasting of source code is a common activity in software engineering. Often, the code is not copied as it is and it may be modified for various purposes; e.g. refactoring, bug fixing, or even software plagiarism. These code modifications could
Clark, D, Krinke, J, Ragkhitwetsagul, C
core +1 more source
Classification of Obfuscation Techniques in LLVM IR: Machine Learning on Vector Representations
We present a novel methodology for classifying code obfuscation techniques in LLVM IR program embeddings. We apply isolated and layered code obfuscations to C source code using the Tigress obfuscator, compile them to LLVM IR, and convert each IR code ...
Sebastian Raubitzek +3 more
doaj +1 more source
PDF-Malware Detection: A Survey and Taxonomy of Current Techniques [PDF]
Portable Document Format, more commonly known as PDF, has become, in the last 20 years, a standard for document exchange and dissemination due its portable nature and widespread adoption. The flexibility and power of this format are not only leveraged by
Aniello, L. +3 more
core +1 more source
Obfuscation-Based Watermarking for Mobile Service Application Copyright Protection in the Cloud
The contributions of cloud computing in the prevention of software piracy are inadequate, and there are still rampant piratical mobile service applications in the cloud.
Sun Guang +4 more
doaj +1 more source

