Program obfuscation (original) (raw)

On the Effectiveness of Source Code Transformations for Binary Obfuscation

Bruno De Bus

2006

View PDFchevron_right

Quantitative measures for code obfuscation security

Rabih Mohsen

2016

View PDFchevron_right

Towards Experimental Evaluation of Code Obfuscation Techniques

Paolo Falcarin

Proceedings of the …, 2008

View PDFchevron_right

A Comprehensive Analysis of Software Obfuscation Techniques

International Journal of Scientific Research in Computer Science, Engineering and Information Technology IJSRCSEIT

International Journal of Scientific Research in Computer Science, Engineering and Information Technology, 2023

View PDFchevron_right

Measuring the robustness of source program obfuscation (studying the impact of compiler optimizations on the obfuscation of C programs)

Sandrine Blazy

Proceedings of the 4th Acm Conference, 2014

View PDFchevron_right

A family of experiments to assess the effectiveness and efficiency of source code obfuscation techniques

mariano ceccato, Paolo Falcarin

View PDFchevron_right

Assessment of Source Code Obfuscation Techniques

mariano ceccato

2016 IEEE 16th International Working Conference on Source Code Analysis and Manipulation (SCAM), 2016

View PDFchevron_right

Code defactoring: Evaluating the effectiveness of Java obfuscations

Cornelia Boldyreff

2012

View PDFchevron_right

Novel obfuscation algorithms for software security

Suma Venkatesh

View PDFchevron_right

Code Obfuscation. Where is it Heading

asmaa mahfoud

IJET, 2020

View PDFchevron_right

Software obfuscation on a theoretical basis and its implementation

Masakazu Soshi, Atsuko Miyaji

IEICE Transactions on Fundamentals, Vol.E86-A

View PDFchevron_right

A large study on the effect of code obfuscation on the quality of java code

A. Capiluppi, Cornelia Boldyreff, mariano ceccato, Paolo Falcarin

2014

View PDFchevron_right

Capturing the Essence of Practical Obfuscation

Jeffrey McDonald

Communications in Computer and Information Science, 2012

View PDFchevron_right

The effectiveness of source code obfuscation: an experimental assessment

Paolo Falcarin

… , 2009. ICPC'09. …, 2009

View PDFchevron_right

On Characteristics of Symbolic Execution in the Problem of Assessing the Quality of Obfuscating Transformations

Юрий Косолапов

Modelirovanie i Analiz Informacionnyh Sistem, 2021

View PDFchevron_right

Optimizing Obfuscation

Divya Kant Gupta 21BEI0028

Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

View PDFchevron_right

binOb+: a framework for potent and stealthy binary obfuscation

YUNA KIM

ACM Conference on Computer and Communications Security, 2010

View PDFchevron_right

RETURN ORIENTED OBFUSCATION

Computer Science & Information Technology (CS & IT) Computer Science Conference Proceedings (CSCP)

View PDFchevron_right

Generation of Efficient Obfuscated Code through Just-in-Time Compilation

Muhammad Hataba

IEICE Transactions on Information and Systems

View PDFchevron_right

A Novel Software Protection Approach for Code Obfuscation to Enhance Software Security

Hemraj Saini

International Journal of Mobile Computing and Multimedia Communications

View PDFchevron_right

A Survey of Control-Flow Obfuscations

Anirban Majumdar, Clark Thomborson

Lecture Notes in Computer Science, 2006

View PDFchevron_right

Parametrization and Evaluation of Intermediate Level Obfuscator

László Lengyel

International Journal of Software Engineering and Knowledge Engineering

View PDFchevron_right

QSynth - A Program Synthesis based approach for Binary Code Deobfuscation

mariano ceccato

Proceedings 2020 Workshop on Binary Analysis Research, 2020

View PDFchevron_right

Metrics-based Evaluation of Slicing Obfuscations

Anirban Majumdar, Clark Thomborson

View PDFchevron_right

Running head: OBFUSCATION THROUGH SELF-MODIFYING CODE 1 Achieving Obfuscation Through Self-Modifying Code: A Theoretical Model

Heidi Waddell

2020

View PDFchevron_right

Obfuscation by partial evaluation of distorted interpreters

Isabella Mastroeni

Proceedings of the ACM SIGPLAN 2012 workshop on Partial evaluation and program manipulation - PEPM '12, 2012

View PDFchevron_right

On Evaluating Obfuscatory Strength of Alias-based Transforms using Static Analysis

Anirban Majumdar, Clark Thomborson

2006 International Conference on Advanced Computing and Communications, 2006

View PDFchevron_right