Research on deformation based binary code obfuscation technology

被引:0
|
作者
Wang, Huai-Jun [1 ,2 ]
Fang, Ding-Yi [1 ,2 ]
Li, Guang-Hui [1 ,2 ]
Zhang, Cong [1 ,2 ]
Jiang, He [1 ,2 ]
机构
[1] School of Info. Sci. and Technol., Northwest Univ., Xi'an 710127, China
[2] NWU-Irdeto IoT-Info. Security Joint Lab., Xi'an 710127, China
关键词
13;
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
页码:14 / 21
相关论文
共 50 条
  • [21] Khaos: The Impact of Inter-procedural Code Obfuscation on Binary Diffing Techniques
    Zhang, Peihua
    Wu, Chenggang
    Peng, Mingfan
    Zeng, Kai
    Yu, Ding
    Lai, Yuanming
    Kang, Yan
    Wang, Wei
    Wang, Zhe
    PROCEEDINGS OF THE 21ST ACM/IEEE INTERNATIONAL SYMPOSIUM ON CODE GENERATION AND OPTIMIZATION, CGO 2023, 2023, : 55 - 67
  • [22] Obfuscation: Maze of Code
    Kanani, Pratik
    Srivastava, Kriti
    Gandhi, Janan
    Parekh, Disha
    Gala, Meeth
    2017 2ND INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS, COMPUTING AND IT APPLICATIONS (CSCITA), 2017, : 11 - 16
  • [23] Semantics-Based Obfuscation-Resilient Binary Code Similarity Comparison with Applications to Software Plagiarism Detection
    Luo, Lannan
    Ming, Jiang
    Wu, Dinghao
    Liu, Peng
    Zhu, Sencun
    22ND ACM SIGSOFT INTERNATIONAL SYMPOSIUM ON THE FOUNDATIONS OF SOFTWARE ENGINEERING (FSE 2014), 2014, : 389 - 400
  • [24] Obfuscation procedure based in Dead Code insertion into Crypter
    Barria, Cristian
    Cubillos, Claudio
    Cordero, David
    Osses, Robinson
    2016 6TH INTERNATIONAL CONFERENCE ON COMPUTERS COMMUNICATIONS AND CONTROL (ICCCC), 2016, : 23 - 29
  • [25] Semantic-based code obfuscation by abstract interpretation
    Preda, MD
    Giacobazzi, R
    AUTOMATA, LANGUAGES AND PROGRAMMING, PROCEEDINGS, 2005, 3580 : 1325 - 1336
  • [26] Trust Evaluation Method Based on the Degree of Code Obfuscation
    Chen, Lu
    Dai, Zaojian
    Li, Nige
    Li, Yong
    SMART COMPUTING AND COMMUNICATION, 2022, 13202 : 164 - 174
  • [27] Semantics-based code obfuscation by abstract interpretation
    Dalla Preda, Mila
    Giacobazzi, Roberto
    JOURNAL OF COMPUTER SECURITY, 2009, 17 (06) : 855 - 908
  • [28] Obfuscation Code Localization Based on CFG Generation of Malware
    Nguyen Minh Hai
    Ogawa, Mizuhito
    Quan Thanh Tho
    FOUNDATIONS AND PRACTICE OF SECURITY (FPS 2015), 2016, 9482 : 229 - 247
  • [29] A Code Encrypt Technique Based on Branch Condition Obfuscation
    Geng P.
    Zhu Y.
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2019, 56 (10): : 2183 - 2192
  • [30] Explaining Binary Obfuscation
    Greco, Claudia
    Ianni, Michele
    Guzzo, Antonella
    Fortino, Giancarlo
    2023 IEEE INTERNATIONAL CONFERENCE ON CYBER SECURITY AND RESILIENCE, CSR, 2023, : 22 - 27