Results 31 to 40 of about 22,093 (250)

Obscuring Mobile Agents by Source Code Obfuscation

open access: yesInternational Journal of Computer Applications, 2013
Security and performance are most essential and prime challenges for networking phenomenon. Computation on the remote host is generally done through links. Thus security is needed when the code is on the way to the destination host. A program travelling over the link is extremely venerable to be forged for malfunctioning.
Atul Mishra, Atul Srivastava, Veena Garg
openaire   +1 more source

FPGA based remote code integrity verification of programs in distributed embedded systems [PDF]

open access: yes, 2012
The explosive growth of networked embedded systems has made ubiquitous and pervasive computing a reality. However, there are still a number of new challenges to its widespread adoption that include scalability, availability, and, especially, security of ...
Basile, Cataldo   +2 more
core   +1 more source

PDF-Malware Detection: A Survey and Taxonomy of Current Techniques [PDF]

open access: yes, 2018
Portable Document Format, more commonly known as PDF, has become, in the last 20 years, a standard for document exchange and dissemination due its portable nature and widespread adoption. The flexibility and power of this format are not only leveraged by
Aniello, L.   +3 more
core   +1 more source

Classification of Obfuscation Techniques in LLVM IR: Machine Learning on Vector Representations

open access: yesMachine Learning and Knowledge Extraction
We present a novel methodology for classifying code obfuscation techniques in LLVM IR program embeddings. We apply isolated and layered code obfuscations to C source code using the Tigress obfuscator, compile them to LLVM IR, and convert each IR code ...
Sebastian Raubitzek   +3 more
doaj   +1 more source

Obfuscation-Based Watermarking for Mobile Service Application Copyright Protection in the Cloud

open access: yesIEEE Access, 2019
The contributions of cloud computing in the prevention of software piracy are inadequate, and there are still rampant piratical mobile service applications in the cloud.
Sun Guang   +4 more
doaj   +1 more source

Array Data Transformation For Source Code Obfuscation

open access: yes, 2007
{"references": ["Markus Dahm, \u00d4\u00c7\u00ffByte Code Engineering with the BCEL API- Technical\nReport B-17-98, April 3, 2001.", "Arjan de Roo, Leon van den Oord, \u00d4\u00c7\u00ffStealthy obfuscation techniques:\nmisleading the pirates-, Department of Computer Science, University of\nTwente Enschede, The Netherlands.", "Sharath.K.Udupa.Saumya K ...
S. Praveen, P. Sojan Lal
openaire   +2 more sources

Artificial Intelligence‐Assisted Workflow for Transmission Electron Microscopy: From Data Analysis Automation to Materials Knowledge Unveiling

open access: yesAdvanced Materials, EarlyView.
AI‐Assisted Workflow for (Scanning) Transmission Electron Microscopy: From Data Analysis Automation to Materials Knowledge Unveiling. Abstract (Scanning) transmission electron microscopy ((S)TEM) has significantly advanced materials science but faces challenges in correlating precise atomic structure information with the functional properties of ...
Marc Botifoll   +19 more
wiley   +1 more source

Light‐Induced Entropy for Secure Vision

open access: yesAdvanced Materials, EarlyView.
This work realized a ternary true random number generator by exploiting stochastic traps emerging within multiple junction interfaces, and quantitatively validated the generation of high‐quality random numbers. Furthermore, it successfully demonstrated diverse applications, including AI‐resilient image security, thereby providing a valuable guide for ...
Juhyung Seo   +9 more
wiley   +1 more source

Code Obfuscation: A Comprehensive Approach to Detection, Classification, and Ethical Challenges

open access: yesAlgorithms
Code obfuscation has become an essential practice in modern software development, designed to make source or machine code challenging for both humans and computers to comprehend.
Tomer Raitsis   +5 more
doaj   +1 more source

Building an obfuscation compiler based on LLVM infrastructure

open access: yesТруды Института системного программирования РАН, 2018
The paper describes the obfuscating transformations, which were implemented while developing an LLVM-based obfuscating compiler in ISP RAS.  The proposed transformations are based on well-known obfuscation algorithms and are specifically improved to ...
V. P. Korchagin   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy