DeepAutoD: Research on distributed machine learning oriented scalable mobile communication security unpacking system

H Lu, C Jin, X Helu, X Du, M Guizani… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
The rapid growth of Android smart phones and abundant applications (Apps), a new security
solution for distributed computing and mobile communications, has prompted many …

[HTML][HTML] Obfuscation undercover: Unraveling the impact of obfuscation layering on structural code patterns

S Raubitzek, S Schrittwieser, E Wimmer… - Journal of Information …, 2024 - Elsevier
Malware often uses code obfuscation to evade detection, employing techniques such as
packing, virtualization, and data encoding or encryption. Despite widespread application …

When are opaque predicates useful?

L Zobernig, SD Galbraith… - 2019 18th IEEE …, 2019 - ieeexplore.ieee.org
Opaque predicates are a commonly used technique in program obfuscation, intended to add
complexity to control flow and to insert dummy code or watermarks. However, there are …

Evaluation Methodologies in Software Protection Research

B De Sutter, S Schrittwieser, B Coppens… - arXiv preprint arXiv …, 2023 - arxiv.org
Man-at-the-end (MATE) attackers have full control over the system on which the attacked
software runs, and try to break the confidentiality or integrity of assets embedded in the …

[PDF][PDF] Machine Learning Classification of Obfuscation using Image Visualization.

C Parker, JT McDonald, D Damopoulos - SECRYPT, 2021 - scitepress.org
As the need for new techniques to analyze obfuscated software has grown, recent work has
shown the ability to analyze programs via machine learning in order to perform automated …

Adversarial Machine Learning for the Protection of Legitimate Software

CB Parker - 2022 - search.proquest.com
Obfuscation is the transforming a given program into one that is syntactically different but
semantically equivalent. This new obfuscated program now has its code and/or data …

[PDF][PDF] Evaluation Methodologies in Software Protection Research—Supplemental Material

B DE SUTTER, S SCHRITTWIESER, B COPPENS… - users.elis.ugent.be
1 Overview This supplemental material categorizes all papers according to their perspective
(Section 2), lists our definitions of software protection methods (Section 3), analysis methods …

When Are Opaque Predicates Useful?

L Zobernig, SD Galbraith, G Russello - Cryptology ePrint Archive, 2017 - eprint.iacr.org
Opaque predicates are a commonly used technique in program obfuscation, intended to add
complexity to control flow and to insert dummy code or watermarks. However, there are …

[引用][C] МЕТОДИ ТА ІНФОРМАЦІЙНА ТЕХНОЛОГІЯ ЗАХИСТУ ПРОГРАМНОГО КОДУ НА ОСНОВІ ЗАСОБІВ ОБФУСКАЦІЇ

МЮ БАЗАЛІЙ - 2021 - НАЦІОНАЛЬНИЙ ТЕХНІЧНИЙ …