Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content
    • by 
    •   15  
      PolymorphismTime UseComputer SecurityCryptography
    • by 
    •   5  
      Software SecurityComputersSource CodeCode Obfuscation
The Process of reverse engineering allows attackers to understand the behavior of software and extract the proprietary algorithms and key data structures (e.g. cryptographic keys) from it. Code obfuscation is the technique is employed to... more
    • by 
    •   4  
      Reverse EngineeringSoftware Piracy ProtectionCode ObfuscationSoftware Protection
    • by 
    •   4  
      Symbolic ExecutionAutomatic code generationCode ObfuscationCondition dependence
    • by 
    •   7  
      Computer ScienceSoftware EngineeringInformation SecurityComputer Security
    • by 
    •   15  
      PolymorphismTime UseComputer SecurityCryptography
    • by 
    •   7  
      Static AnalysisSemanticsCryptographyEncryption
Reverse Engineering is the process of revealing hidden code from class file. It converts garbage to readable English text. The main purpose of Reverse Engineering is to uncover the hidden code when the documentation is poor, missing... more
    • by 
    •   5  
      Computer ScienceJava ProgrammingReverse EngineeringEngineering Technology
    • by 
    •   5  
      Computer SecuritySoftware ImplementationFormal ModelCode Obfuscation
    • by 
    •   7  
      Static AnalysisPolymorphismMalware DetectionCode Obfuscation
While many obfuscation schemes proposed, none of them satisfy any strong definition of obfuscation. Furthermore secure general-purpose obfuscation algorithms have been proven to be impossible. Nevertheless, obfuscation schemes which in... more
    • by 
    •   8  
      Computational ComplexityStatic AnalysisReverse EngineeringEmpirical Study
    • by 
    • Code Obfuscation
    • by  and +1
    •   6  
      Static AnalysisDistributed SystemReverse EngineeringDynamic Analysis
    • by 
    •   8  
      Information SystemsSoftware SecurityAbstract InterpretationComputer Software
    • by 
    •   3  
      Reverse EngineeringFrameworkCode Obfuscation
    • by 
    •   6  
      CryptographyPartial InformationError CorrectionCode Obfuscation
    • by 
    •   5  
      Software ImplementationCode ObfuscationTheoretical ModelTheoretical Foundation
    • by 
    •   7  
      Statistical AnalysisProgram TransformationCase StudyExperimental Study
    • by 
    •   9  
      Computer ScienceArtReverse EngineeringComputational Science and Engineering
    • by 
    •   5  
      Reverse EngineeringPseudo-Random Number GeneratorCode ObfuscationRandom Number Generation
Reverse Engineering is the process of revealing hidden code from class file. It converts garbage to readable English text. The main purpose of Reverse Engineering is to uncover the hidden code when the documentation is poor, missing... more
    • by 
    •   4  
      Obfuscation (Information Security And Cryptography)Java ProgrammingReverse EngineeringCode Obfuscation
    • by 
    •   6  
      CryptographyPartial InformationError CorrectionCode Obfuscation
    • by 
    •   8  
      Information SystemsSoftware SecurityAbstract InterpretationComputer Software
    • by 
    •   6  
      CryptographyPartial InformationError CorrectionCode Obfuscation
    • by 
    •   5  
      Performance AnalysisData Flow DiagramCode ObfuscationCode Coverage
    • by 
    •   7  
      Flow ControlReverse EngineeringProceedingsData Structure
    • by 
    •   4  
      Java ProgrammingReverse EngineeringSource CodeCode Obfuscation
    • by 
    •   3  
      Auxiliary informationCode ObfuscationError Correction Code Words
Abstract-Mobile agents have the ability to relocate computation and then carry communication with their peers locally. The design and implementation of mechanism to relocate computations requires a careful assessment of security issues.... more
    • by 
    •   8  
      Reverse EngineeringCode GenerationSoftware AnalysisMobile Agent
    • by 
    •   5  
      Computer VirologyComputer VirusesCode ObfuscationCryptographic Hash Function
    • by 
    •   5  
      Software SecurityReverse EngineeringCode ObfuscationIndexation
Reverse Engineering is the process of revealing hidden code from class file. It converts garbage to readable English text. The main purpose of Reverse Engineering is to uncover the hidden code when the documentation is poor, missing... more
    • by 
    •   4  
      Java ProgrammingReverse EngineeringEngineering TechnologyCode Obfuscation
    • by 
    •   13  
      Automatic ControlReverse EngineeringSoftware MeasurementProgram Comprehension
Software reverse engineering is an active threat against software programs. One of the popular techniques used to make software reverse engineering harder is obfuscation. Among various control flow obfuscations methods proposed in the... more
    • by 
    •   3  
      Reverse EngineeringCode ObfuscationSoftware Protection
    • by 
    •   5  
      Program ComprehensionEmpirical StudySource CodeCode Obfuscation
Source code obfuscation is a protection mechanism widely used to limit the possibility of malicious reverse en gi- neering or attack activities on a software system. Although several code obfuscation techniques and tools are availabl e,... more
    • by 
    •   5  
      Program ComprehensionEmpirical StudySource CodeCode Obfuscation
It has become more and more common to distribute software in forms that retain most or all of the information present in the original source code. An important example is Java bytecode. Since such codes are easy to decompile, they... more
    • by 
    •   4  
      Reverse EngineeringSource CodeCode ObfuscationInformation Presentation