A survey of android application and malware hardening

V Sihag, M Vardhan, P Singh - Computer Science Review, 2021 - Elsevier
In the age of increasing mobile and smart connectivity, malware poses an ever evolving
threat to individuals, societies and nations. Anti-malware companies are often the first and …

Protecting software through obfuscation: Can it keep pace with progress in code analysis?

S Schrittwieser, S Katzenbeisser, J Kinder… - Acm computing surveys …, 2016 - dl.acm.org
Software obfuscation has always been a controversially discussed research area. While
theoretical results indicate that provably secure obfuscation in general is impossible, its …

Obfuscator-LLVM--software protection for the masses

P Junod, J Rinaldini, J Wehrli… - 2015 ieee/acm 1st …, 2015 - ieeexplore.ieee.org
Software security with respect to reverse-engineering is a challenging discipline that has
been researched for several years and which is still active. At the same time, this field is …

Detecting environment-sensitive malware

M Lindorfer, C Kolbitsch… - Recent Advances in …, 2011 - Springer
The execution of malware in an instrumented sandbox is a widespread approach for the
analysis of malicious code, largely because it sidesteps the difficulties involved in the static …

Code obfuscation against symbolic execution attacks

S Banescu, C Collberg, V Ganesh… - Proceedings of the …, 2016 - dl.acm.org
Code obfuscation is widely used by software developers to protect intellectual property, and
malware writers to hamper program analysis. However, there seems to be little work on …

[PDF][PDF] Digital rights management for content distribution

Q Liu, R Safavi-Naini, NP Sheppard - Conferences in Research and …, 2003 - Citeseer
Transferring the traditional business model for selling digital goods linked to physical media
to the online world leads to the need for a system to protect digital intellectual property …

[PDF][PDF] Zero-day Malware Detection based on Supervised Learning Algorithms of API call Signatures.

M Alazab, S Venkatraman, PA Watters, M Alazab - AusDM, 2011 - academia.edu
Zero-day or unknown malware are created using code obfuscation techniques that can
modify the parent code to produce offspring copies which have the same functionality but …

Profiling and classifying the behavior of malicious codes

M Alazab - Journal of Systems and Software, 2015 - Elsevier
Malware is a major security threat confronting computer systems and networks and has
increased in scale and impact from the early days of ICT. Traditional protection mechanisms …

Oblivious hashing: A stealthy software integrity verification primitive

Y Chen, R Venkatesan, M Cary, R Pang… - Information Hiding: 5th …, 2003 - Springer
We describe a novel software verification primitive called Oblivious Hashing. Unlike
previous techniques that mainly verify the static shape of code, this primitive allows implicit …

Cyber-physical systems: A security perspective

C Konstantinou, M Maniatakos, F Saqib… - 2015 20th IEEE …, 2015 - ieeexplore.ieee.org
A cyber-physical system (CPS) is a composition of independently interacting components,
including computational elements, communications and control systems. Applications of …