Function-level obfuscation detection method based on graph convolutional networks

S Jiang, Y Hong, C Fu, Y Qian, L Han - Journal of Information Security and …, 2021 - Elsevier
The obfuscation detection technology is an important auxiliary means of malware detection.
Also, for security practitioners, it can carry out automatic obfuscation detection before …

A security model and implementation of embedded software based on code obfuscation

J Yi, L Chen, H Zhang, Y Li… - 2020 IEEE 19th …, 2020 - ieeexplore.ieee.org
Current approaches for the security of embedded software mainly focused on some specific
platforms. In this paper, a security model based on code obfuscation is applied to embedded …

[HTML][HTML] Полухрупкие цифровые водяные знаки, базирующиеся на спектре Фурье

ИВ Нечта - Вестник СибГУТИ, 2019 - cyberleninka.ru
Для обнаружения несанкционированных изменений исполняемых файлов
вредоносными программами применяются цифровые водяные знаки (ЦВЗ). Свойство …

Enhanced branch obfuscation based on exception handling and encrypted mapping table

F Xiang, D Gong, C Yang, F Liu - Proceedings of the ACM Turing …, 2019 - dl.acm.org
Reverse analysis will lead to the problems of software crack, theft and tamper, where the
control flow analysis will reveal the program execution logic. The conditional jump …

A code protection method against function call analysis in P2P network

F Xiang, D Gong, J Li, F Liu - Peer-to-Peer Networking and Applications, 2019 - Springer
The P2P network has the characteristics of opening and sharing, and a large number of
managing and controlling software are deployed on the distributed network nodes. Hence, it …

[PDF][PDF] Intensification of Software Security using Secure Obfuscation with Injecting and Detecting Code Clones

P Gautam, H Saini - 2019 - ir.juit.ac.in
This chapter presents background and related work on software security. We eventuate with
section 2.1, which provides a brief introduction about software security. In section 2.2 we …

Software Protection Framework based on Code Obfuscation Techniques رسالة ماجستير‎

I Nassra, MZ Abed - 2018 - repository.aaup.edu
Protecting intellectual property against tampering and reverse analysis is an urgent issue to
many software designers, where illegal access to sensitive data is a form of copyright …

[引用][C] МЕТОДИ ТА ІНФОРМАЦІЙНА ТЕХНОЛОГІЯ ЗАХИСТУ ПРОГРАМНОГО КОДУ НА ОСНОВІ ЗАСОБІВ ОБФУСКАЦІЇ

МЮ БАЗАЛІЙ - 2021 - НАЦІОНАЛЬНИЙ ТЕХНІЧНИЙ …

[引用][C] Методы построения цифровых водяных знаков в исполняемых файлах

АН Фионов