نتایج جستجو برای: Obfuscation

تعداد نتایج: 1527  

Journal: :Nature 1989

Journal: :IEE Proceedings - Software 2006
Ting-Wei Hou Hsiang-Yang Chen Ming-Hsiu Tsai

Three novel control computation (control flow) obfuscation methods are described for protecting Java class files. They are basic block fission obfuscation, intersecting loop obfuscation and replacing goto obfuscation. The basic block fission obfuscation splits some chosen basic block(s) into more basic blocks, in which opaque predicates and goto instructions are inserted to make decompiling uns...

Journal: :South African Family Practice 2009

Journal: :CoRR 2016
Parvez Faruki Hossein Fereidooni Vijay Laxmi Mauro Conti Manoj Singh Gaur

Mobile devices have become ubiquitous due to centralization of private user information, contacts, messages and multiple sensors. Google Android, an open-source mobile Operating System (OS), is currently the market leader. Android popularity has motivated the malware authors to employ set of cyber attacks leveraging code obfuscation techniques. Obfuscation is an action that modifies an applicat...

2007
Nikolay Kuzurin Alexander V. Shokurov Nikolay P. Varnovsky Vladimir A. Zakharov

Program obfuscation is a semantic-preserving transformation aimed at bringing a program into such a form, which impedes the understanding of its algorithm and data structures or prevents extracting of some valuable information from the text of a program. Since obfuscation could find wide use in computer security, information hiding and cryptography, security requirements to program obfuscators ...

Journal: :BioScience 2012

2015
Salar Mohtaj Habibollah Asghari Vahid Zarrabi

In this paper, we describe an approach to create monolingual English plagiarism detection corpus for the task of text alignment corpus construction in PAN 2015 competition. We propose two different obfuscation methods to fragment obfuscation for creating the cases of plagiarism. The first method is an artificial obfuscation which consists of variety of obfuscation strategies such as synonym sub...

2014
Pille Pullonen Dominique Unruh

The intuitive meaning of obfuscation is taking a program and turning it into a program with the same functionality but somehow unintelligible structure. There have been practical approaches at obfuscating computer programs, but until 2001 [BGI01] there was not much theory in this field. Especially, it was not well defined what is meant by obfuscation. The main step of specifying the meaning of ...

2003
Larry D'Anna Brian Matt Andrew Reisse Tom Van Vleck Steve Schwab Patrick LeBlanc

This document describes our investigation into software obfuscation for building SelfProtecting Mobile Agents (SPMA). The original goal of the SPMA project was to develop automated tools to protect mobile agents from attacks by malicious hosts. In development of those tools, we realized obfuscation could not be relied upon to give a reasonable amount of security. Because of this, we redirected ...

2013
VIR V PHOHA

This research aimed at developing a theoretical framework to predict the next obfuscation (or deobfuscation) move of the adversary, with the intent of making cyber defense proactive. More specifically, the goal was to understand the relationship between obfuscation and deobfuscation techniques employed in malware offense and defense. The strategy was to build upon previous work of Giacobazzi an...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید