Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Code Obfuscation
biblio
Hiding in the Particles: When Return-Oriented Programming Meets Program Obfuscation
Submitted by grigby1 on Fri, 02/04/2022 - 2:48pm
rop attacks
pubcrawl
Resiliency
Scalability
composability
Human Factors
Code Obfuscation
Program Protection
programming
resilience
return oriented programming
Return Oriented Programming (ROP)
Robustness
ROP
Software
biblio
A New Technique for Detecting Android App Clones Using Implicit Intent and Method Information
Submitted by aekwall on Mon, 08/10/2020 - 10:32am
Metrics
android encryption
repackaged apps
online markets
method information
malicious codes
intent
implicit intents
code obfuscation techniques
Cloning
clone detection
class method
Android app clones detection
Andorid app
Code Obfuscation
Scalability
Android ecosystem
reverse engineering
Android (operating system)
Data mining
tools
pubcrawl
Human behavior
Resiliency
feature extraction
mobile computing
invasive software
malware
encryption
biblio
[Research Paper] Combining Obfuscation and Optimizations in the Real World
Submitted by aekwall on Mon, 07/20/2020 - 10:55am
Code Obfuscation
white box cryptography
white-box encryption calls
tool-specific countermeasures
sequential pass management techniques
scheduling code transformations
rewriting systems
reverse engineer
pass scheduling problem
pass ordering
pass combinations
multicriteria optimization problem
Job shop scheduling
industrial-strength obfuscator
code tangling techniques
code obfuscator
Cryptography
program compilers
reverse engineering
Virtualization
scheduling
obfuscation
Heuristic algorithms
optimisation
tools
optimization
Metrics
composability
pubcrawl
Resiliency
Kernel
biblio
A survey of zero-day malware attacks and its detection methodology
Submitted by grigby1 on Fri, 07/10/2020 - 1:08pm
invasive software
zero-days
zero-day malware attacks
security systems
Resiliency
resilience
pubcrawl
Privacy-invasive software
Metrics
malware outbreaks
malware developers
malware detection
malware
large-scale attacks
advanced persistent threats
Human Factors
Human behavior
end-point security solutions
Electronic mail
detection methodology
detection
cryptojacking
Cryptography
Code Obfuscation
botnets
botnet
APT
analysis
biblio
Resilient Decentralized Android Application Repackaging Detection Using Logic Bombs
Submitted by grigby1 on Thu, 01/31/2019 - 12:16pm
Android app repackaging
android encryption
Code Obfuscation
Human behavior
Human Factors
Metrics
pubcrawl
resilience
Resiliency
Scalability
biblio
Hardware-assisted code obfuscation for FPGA soft microprocessors
Submitted by grigby1 on Mon, 02/27/2017 - 12:53pm
many embedded FPGA system
Table lookup
Switches
software security
software confidentiality
Software
Soft microprocessor
security of data
pubcrawl170107
minimal hardware overhead
microprocessor chips
Code Obfuscation
hardware-software codesign
hardware assisted code obfuscation
Hardware
FPGA soft microprocessors
field programmable gate arrays
encryption
encoding
data dependent control flow modification
Complexity theory
biblio
Algorithmic information theory for obfuscation security
Submitted by grigby1 on Mon, 02/27/2017 - 12:53pm
Code Obfuscation
Complexity theory
encoding
Intellectual Property Protection
Kolmogorov Complexity
Measurement
pubcrawl170107
reverse engineering
security
Software