نتایج جستجو برای: deobfuscation

تعداد نتایج: 38  

2013
VIR V PHOHA

This research aimed at developing a theoretical framework to predict the next obfuscation (or deobfuscation) move of the adversary, with the intent of making cyber defense proactive. More specifically, the goal was to understand the relationship between obfuscation and deobfuscation techniques employed in malware offense and defense. The strategy was to build upon previous work of Giacobazzi an...

2007
Seunghak Lee Iryoung Jeong Seungjin Choi

Spam deobfuscation is a processing to detect obfuscated words appeared in spam emails and to convert them back to the original words for correct recognition. Lexicon tree hidden Markov model (LTHMM) was recently shown to be useful in spam deobfuscation. However, LT-HMM suffers from a huge number of states, which is not desirable for practical applications. In this paper we present a complexity-...

Journal: :Proceedings of the Institute for System Programming of RAS 2013

Journal: :Journal of the Korea Institute of Information Security and Cryptology 2017

Journal: :Frontiers in big data 2021

Circuit obfuscation is a recently proposed defense mechanism to protect the intellectual property (IP) of digital integrated circuits (ICs) from reverse engineering. There have been effective schemes, such as satisfiability (SAT)-checking based attacks that can potentially decrypt obfuscated circuits, which called deobfuscation. Deobfuscation runtime could be days or years, depending on layouts...

Journal: :Forensic Science International: Digital Investigation 2021

Android obfuscation techniques include not only classic code that were adapted to Android, but also methods target the platform specifically. This work examines status-quo of obfuscation, detection and deobfuscation. Specifically, it first summarizes approaches are commonly used by app developers for optimization, protect their software against theft tampering frequently misused malware circumv...

Journal: :Investigacion e Innovación en Ingenierias 2015

Journal: :Electronics 2022

With the improvement of software copyright protection awareness, code obfuscation technology plays a crucial role in protecting key segments. As becomes more and complex diverse, it has spawned large number malware variants, which make easy to evade detection anti-virus software. Malicious mainly depends on binary similarity analysis. However, existing analysis technologies are difficult deal w...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید