Assessing the Security Properties of Software Obfuscation

被引:0
|
作者
Xu, Hui [1 ]
Lyu, Michael R. [1 ]
机构
[1] Chinese Univ Hong Kong, Comp Sci & Engn Dept, Hong Kong, Hong Kong, Peoples R China
基金
中国国家自然科学基金;
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
引用
收藏
页码:80 / 83
页数:4
相关论文
共 50 条
  • [31] Evaluating Obfuscation Security: A Quantitative Approach
    Mohsen, Rabih
    Pinto, Alexandre Miranda
    FOUNDATIONS AND PRACTICE OF SECURITY (FPS 2015), 2016, 9482 : 174 - 192
  • [32] Network Obfuscation for Net Worth Security
    Chaddad, Louma
    Chehab, Ali
    Elhajj, Imad H.
    Kayssi, Ayman
    2020 SEVENTH INTERNATIONAL CONFERENCE ON SOFTWARE DEFINED SYSTEMS (SDS), 2020, : 83 - 88
  • [33] A Model Obfuscation Approach to IoT Security
    Guo, Yunqi
    Tan, Zhaowei
    Chen, Kaiyuan
    Lu, Songwu
    Wu, Ying Nian
    2021 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2021, : 1 - 9
  • [34] Software Protection with Increased Complexity and Obfuscation
    Tsui, Frank
    Duggins, Sheryl
    Karam, Orlando
    PROCEEDINGS OF THE 50TH ANNUAL ASSOCIATION FOR COMPUTING MACHINERY SOUTHEAST CONFERENCE, 2012,
  • [35] Software obfuscation from crackers' viewpoint
    Yamauchi, Hiroki
    Kanzaki, Yuichiro
    Monden, Akito
    Nakamura, Masahide
    Matsumoto, Ken-ichi
    PROCEEDINGS OF THE IASTED INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTER SCIENCE AND TECHNOLOGY, 2006, : 286 - +
  • [36] A SOFTWARE FRAMEWORK FOR CODE SECURITY USING M-COT-METRICS BASED CODE OBFUSCATION TECHNIQUE
    Senthilkumar, R.
    Thangavelu, Arunkumar
    JURNAL TEKNOLOGI, 2016, 78 (02): : 73 - 81
  • [37] Software Protection via Hiding Function using Software Obfuscation
    Samawi, Venus
    Sulaiman, Adeeb
    INTERNATIONAL ARAB JOURNAL OF INFORMATION TECHNOLOGY, 2013, 10 (06) : 587 - 594
  • [38] Catalog of metrics for assessing security risks of software throughout the software development life cycle
    Sultan, Khalid
    En-Nouaary, Abdeslam
    Hanaou-Lhadj, Abdelwahab
    PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON INFORMATION SECURITY AND ASSURANCE, 2008, : 461 - 465
  • [39] Benchmark Requirements for Assessing Software Security Vulnerability Testing Tools
    Parizi, Reza M.
    Qian, Kai
    Shahriar, Hossain
    Wu, Fan
    Tao, Lixin
    2018 IEEE 42ND ANNUAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE (COMPSAC), VOL 1, 2018, : 825 - 826
  • [40] Assessing and Extracting Software Security Vulnerabilities in SOFL Formal Specifications
    Emeka, Busalire Onesmus
    Liu, Shaoying
    2018 INTERNATIONAL CONFERENCE ON ELECTRONICS, INFORMATION, AND COMMUNICATION (ICEIC), 2018, : 374 - 377