<italic>SCORE</italic>: Source Code Optimization & REconstruction
The main goal of obfuscation is to make software difficult to analyze. Although obfuscation is one useful method to protect programs, the ability to analyze malware is greatly reduced if used for malicious purposes. The obfuscation technique is most applicable at the binary level, but it can also be...
Main Authors: | Jae Hyuk Suk, Young Bi Lee, Dong Hoon Lee |
---|---|
Format: | Article |
Language: | English |
Published: |
IEEE
2020-01-01
|
Series: | IEEE Access |
Subjects: | |
Online Access: | https://ieeexplore.ieee.org/document/9139493/ |
Similar Items
-
C Source code Obfuscation using Hash Function and Encryption Algorithm
by: Sarah Rosdiana Tambunan, et al.
Published: (2023-07-01) -
VCF: Virtual Code Folding to Enhance Virtualization Obfuscation
by: Jae Hyuk Suk, et al.
Published: (2020-01-01) -
Metrics for code obfuscation based on symbolic execution and N-scope complexity
by: Yuqiang XIAO, Yunfei GUO, Yawen WANG
Published: (2022-12-01) -
Android Authorship Attribution Using Source Code-Based Features
by: Emre Aydogan, et al.
Published: (2024-01-01) -
The Technique of Binary Code Decompilation and Its Application in Information Security Sphere
by: M. O. Shudrak, et al.
Published: (2012-12-01)