Research on deformation based binary code obfuscation technology

被引:0
|
作者
Wang, Huai-Jun [1 ,2 ]
Fang, Ding-Yi [1 ,2 ]
Li, Guang-Hui [1 ,2 ]
Zhang, Cong [1 ,2 ]
Jiang, He [1 ,2 ]
机构
[1] School of Info. Sci. and Technol., Northwest Univ., Xi'an 710127, China
[2] NWU-Irdeto IoT-Info. Security Joint Lab., Xi'an 710127, China
关键词
13;
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
页码:14 / 21
相关论文
共 50 条
  • [31] An obfuscation for binary trees
    Drape, Stephen
    TENCON 2006 - 2006 IEEE REGION 10 CONFERENCE, VOLS 1-4, 2006, : 220 - 223
  • [32] Research on the collaborative analysis technology for source code and binary executable based upon the unified defect mode set
    Liang, Xiaobing
    Cui, Baojiang
    Lv, Yingjie
    Fu, Yilun
    2015 9TH INTERNATIONAL CONFERENCE ON INNOVATIVE MOBILE AND INTERNET SERVICES IN UBIQUITOUS COMPUTING IMIS 2015, 2015, : 260 - 264
  • [33] Research of automatic code generating technology based on AADL
    Ma, Liang
    Gui, Shenglin
    Luo, Lei
    Yin, Limeng
    2008 INTERNATIONAL CONFERENCE ON EMBEDDED SOFTWARE AND SYSTEMS SYMPOSIA, PROCEEDINGS, 2008, : 136 - +
  • [34] A code obfuscation framework using code clones
    Kulkarni, Aniket
    Metta, Ravindra
    22nd International Conference on Program Comprehension, ICPC 2014 - Proceedings, 2014, : 295 - 299
  • [35] Semantics-Based Obfuscation-Resilient Binary Code Similarity Comparison with Applications to Software and Algorithm Plagiarism Detection
    Luo, Lannan
    Ming, Jiang
    Wu, Dinghao
    Liu, Peng
    Zhu, Sencun
    IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 2017, 43 (12) : 1157 - 1177
  • [36] An innovative algorithm for code Obfuscation
    Muhammad, Aslam
    Zia-ul Qayyum
    Ashfaq, Ahmad
    Waqar, M. M.
    Martinez-Enriquez, A. M.
    Syed, Afraz Z.
    LIFE SCIENCE JOURNAL-ACTA ZHENGZHOU UNIVERSITY OVERSEAS EDITION, 2012, 9 (01): : 527 - 533
  • [37] A Study & Review on Code Obfuscation
    Sebastian, Savio Antony
    Malgaonkar, Saurabh
    Shah, Paulami
    Kapoor, Mudit
    Parekhji, Tanay
    2016 WORLD CONFERENCE ON FUTURISTIC TRENDS IN RESEARCH AND INNOVATION FOR SOCIAL WELFARE (STARTUP CONCLAVE), 2016,
  • [38] Genetic Improvement for Code Obfuscation
    Petke, Justyna
    PROCEEDINGS OF THE 2016 GENETIC AND EVOLUTIONARY COMPUTATION CONFERENCE (GECCO'16 COMPANION), 2016, : 1135 - 1136
  • [39] COOPS: A Code Obfuscation Method Based on Obscuring Program Semantics
    Li, Yang
    Kang, Fei
    Shu, Hui
    Xiong, Xiaobing
    Sha, Zihan
    Sui, Zhonghang
    SECURITY AND COMMUNICATION NETWORKS, 2022, 2022
  • [40] On the Effectiveness of Code-Reuse-Based Android Application Obfuscation
    Tang, Xiaoxiao
    Liang, Yu
    Ma, Xinjie
    Lin, Yan
    Gao, Debin
    INFORMATION SECURITY AND CRYPTOLOGY - ICISC 2016, 2017, 10157 : 333 - 349