Assessing the Security Properties of Software Obfuscation

被引:0
|
作者
Xu, Hui [1 ]
Lyu, Michael R. [1 ]
机构
[1] Chinese Univ Hong Kong, Comp Sci & Engn Dept, Hong Kong, Hong Kong, Peoples R China
基金
中国国家自然科学基金;
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
引用
收藏
页码:80 / 83
页数:4
相关论文
共 50 条
  • [1] Layered obfuscation: a taxonomy of software obfuscation techniques for layered security
    Hui Xu
    Yangfan Zhou
    Jiang Ming
    Michael Lyu
    Cybersecurity, 3
  • [2] On the concept of software obfuscation in computer security
    Kuzurin, Nikolay
    Shokurov, Alexander
    Varnovsky, Nikolay
    Zakharov, Vladimir
    INFORMATION SECURITY, PROCEEDINGS, 2007, 4779 : 281 - +
  • [3] Novel obfuscation algorithms for software security
    Ertaul, L
    Venkatesh, S
    SERP '05: PROCEEDINGS OF THE 2005 INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING RESEARCH AND PRACTICE, VOLS 1 AND 2, 2005, : 209 - 215
  • [4] Layered obfuscation: a taxonomy of software obfuscation techniques for layered security
    Xu, Hui
    Zhou, Yangfan
    Ming, Jiang
    Lyu, Michael
    CYBERSECURITY, 2020, 3 (01)
  • [5] Stealthy Code Obfuscation Technique for Software Security
    Darwish, Saad M.
    Guirguis, Shawkat K.
    Zalat, Mohamed S.
    ICCES'2010: THE 2010 INTERNATIONAL CONFERENCE ON COMPUTER ENGINEERING & SYSTEMS, 2010, : 93 - 99
  • [6] Assessing security properties of software components: A software engineer's perspective
    Khan, Khaled M.
    Han, Jun
    2006 AUSTRALIAN SOFTWARE ENGINEERING CONFERENCE, PROCEEDINGS, 2006, : 199 - +
  • [7] A Survey on Aims and Environments of Diversification and Obfuscation in Software Security
    Hosseinzadeh, Shohreh
    Rauti, Sampsa
    Lauren, Samuel
    Makela, Jari-Matti
    Holvitie, Johannes
    Hyrynsalmi, Sami
    Leppanen, Ville
    COMPUTER SYSTEMS AND TECHNOLOGIES, COMPSYSTECH'16, 2016, : 113 - 120
  • [8] Function Level Control Flow Obfuscation for Software Security
    Balachandran, Vivek
    Keong, Ng Wee
    Emmanuel, Sabu
    2014 EIGHTH INTERNATIONAL CONFERENCE ON COMPLEX, INTELLIGENT AND SOFTWARE INTENSIVE SYSTEMS (CISIS),, 2014, : 133 - 140
  • [9] Diversification and obfuscation techniques for software security: A systematic literature review
    Hosseinzadeh, Shohreh
    Rauti, Sampsa
    Lauren, Samuel
    Makela, Jari-Matti
    Holvitie, Johannes
    Hyrynsalmi, Sami
    Leppanen, Ville
    INFORMATION AND SOFTWARE TECHNOLOGY, 2018, 104 : 72 - 93
  • [10] A Security Model and Implementation of Embedded Software Based on Code Obfuscation
    Yi, Jiajia
    Chen, Lirong
    Zhang, Haitao
    Li, Yun
    Zhao, Huanyu
    2020 IEEE 19TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2020), 2020, : 1606 - 1613