Research on deformation based binary code obfuscation technology

被引:0
|
作者
Wang, Huai-Jun [1 ,2 ]
Fang, Ding-Yi [1 ,2 ]
Li, Guang-Hui [1 ,2 ]
Zhang, Cong [1 ,2 ]
Jiang, He [1 ,2 ]
机构
[1] School of Info. Sci. and Technol., Northwest Univ., Xi'an 710127, China
[2] NWU-Irdeto IoT-Info. Security Joint Lab., Xi'an 710127, China
关键词
13;
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
页码:14 / 21
相关论文
共 50 条
  • [41] A Security Model and Implementation of Embedded Software Based on Code Obfuscation
    Yi, Jiajia
    Chen, Lirong
    Zhang, Haitao
    Li, Yun
    Zhao, Huanyu
    2020 IEEE 19TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2020), 2020, : 1606 - 1613
  • [42] Exploiting Dynamic Scheduling for VM-Based Code Obfuscation
    Kuang, Kaiyuan
    Tang, Zhanyong
    Gong, Xiaoqing
    Fang, Dingyi
    Chen, Xiaojiang
    Xing, Tianzhang
    Ye, Guixin
    Zhang, Jie
    Wang, Zheng
    2016 IEEE TRUSTCOM/BIGDATASE/ISPA, 2016, : 489 - 496
  • [43] Quick Response Code Binary Research Based on Basic Image Processing
    Wu, Yun
    Yu, Shaoyong
    Yang, Mei
    SENSORS AND MATERIALS, 2019, 31 (03) : 859 - 871
  • [44] Binary obfuscation using signals
    Popov, Igor V.
    Debray, Saurnya K.
    Andrews, Gregory R.
    USENIX ASSOCIATION PROCEEDINGS OF THE 16TH USENIX SECURITY SYMPOSIUM, 2007, : 275 - 290
  • [45] Research on Decoding QR Code based on Image Processing Technology
    Guo, Jianmin
    Feng, Lijie
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON ADVANCES IN MECHANICAL ENGINEERING AND INDUSTRIAL INFORMATICS, 2015, 15 : 1614 - 1620
  • [46] WASMixer: Binary Obfuscation for WebAssembly
    Cao, Shangtong
    He, Ningyu
    Guo, Yao
    Wang, Haoyu
    COMPUTER SECURITY-ESORICS 2024, PT III, 2024, 14984 : 88 - 109
  • [47] The malicious code hiding techniques, code obfuscation problem
    Hurtuk, Jan
    Copjak, Marek
    Dufala, Marek
    Drienik, Pavol
    12TH IEEE INTERNATIONAL CONFERENCE ON EMERGING ELEARNING TECHNOLOGIES AND APPLICATIONS (ICETA 2014), 2014, : 181 - 185
  • [48] Obfuscation undercover: Unraveling the impact of obfuscation layering on structural code patterns
    Raubitzek, Sebastian
    Schrittwieser, Sebastian
    Wimmer, Elisabeth
    Mallinger, Kevin
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2024, 85
  • [49] Following the Obfuscation Trail: Identifying and Exploiting Obfuscation Signatures in Malicious Code
    Cassagne, Julien
    Merlo, Ettore
    Jourdan, Guy-Vincent
    Onut, Iosif-Viorel
    FOUNDATIONS AND PRACTICE OF SECURITY, PT I, FPS 2023, 2024, 14551 : 321 - 338
  • [50] Control flow obfuscation technology based on random insertion
    Sun, Yongyong (yongsunjd@126.com), 1600, Universidad Central de Venezuela (55):