Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 228,398,566 papers from all fields of science
Search
Sign In
Create Free Account
Obfuscation (software)
Known as:
Obfuscator
, Obfuscated code
, Obfuscating software
Expand
In software development, manual obfuscation is the deliberate act of creating obfuscated code, i.e. source or machine code that is difficult for…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
31 relations
Anti-tamper software
Backdoor (computing)
Business models for open-source software
C++
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2015
2015
Predicting Users' Motivations behind Location Check-Ins and Utility Implications of Privacy Protection Mechanisms
Igor Bilogrevic
,
Kévin Huguenin
,
Stefan Mihaila
,
R. Shokri
,
J. Hubaux
Network and Distributed System Security Symposium
2015
Corpus ID: 2020359
Location check-ins contain both geographical and semantic information about the visited venues, in the form of tags (e.g…
Expand
2013
2013
Malicious Website Detection Based on Honeypot Systems
Tung-Ming Koo
,
Hung-Chang Chang
,
Ya-Ting Hsu
,
Huey-Yeh Lin
IEEE International Conference on Computational…
2013
Corpus ID: 62190665
In the Internet age, every computer user is likely to inadvertently encounter highly contagious viruses. Over the past several…
Expand
2011
2011
Metamorphic Virus Detection in Portable Executables Using Opcodes Statistical Feature
Babak Bashari Rad
,
M. Masrom
arXiv.org
2011
Corpus ID: 16393316
Metamorphic viruses engage different mutation techniques to escape from string signature based scanning. They try to change their…
Expand
2007
2007
Hidden problems of asynchronous proactive recovery
Paulo Sousa
,
N. Neves
,
P. Veríssimo
2007
Corpus ID: 12403052
A node-exhaustion-safe intrusion-tolerant distributed system is a system that assuredly does not suffer more than the assumed…
Expand
2006
2006
A Computational Model for Watermark Robustness
André Adelsbach
,
S. Katzenbeisser
,
A. Sadeghi
Information Hiding
2006
Corpus ID: 14748068
Multimedia security schemes often combine cryptographic schemes with information hiding techniques such as steganography or…
Expand
2006
2006
Three control flow obfuscation methods for Java software
Ting-Wei Hou
,
Hsiang-Yang Chen
,
M. Tsai
IEE Proceedings - Software
2006
Corpus ID: 9957144
Three novel control computation (control flow) obfuscation methods are described for protecting Java class files. They are basic…
Expand
2004
2004
Electronic Voting Systems Is Brazil ahead of its time
Pedro A. D. Rezende
2004
Corpus ID: 14897796
In May 2001, from the losing end of a fierce internal power dispute, the president of the Brazilian Senate publicly admitted to…
Expand
2002
2002
Self-Protecting Mobile Agents Obfuscation Techniques Evaluation Report
L. Badger
,
Larry D'Anna
,
D. Kilpatrick
,
B. Matt
,
Andrew Reisse
,
Tom Van
2002
Corpus ID: 16607540
This document presents an analysis of various program obfuscation techniques performed as part of the Self-Protecting Mobile…
Expand
1998
1998
Coevolving communicative behavior in a linear pursuer-evadergame
S. Ficici
,
J. Pollack
1998
Corpus ID: 15979768
The pursuer-evader (PE) game is recognized as an important domain in which to study the coevolution of robust adaptive behavior…
Expand
1984
1984
THE INFLUENCE OF NECTAR RESOURCES ON NESTING SUCCESS AND MOVEMENT PATTERNS OF THE COMMON AMAKIHI (HEMIGNATHUS VIRENS)
C. Riper
1984
Corpus ID: 59474566
The objectives of this study were to investigate the influence of nectar re- sources on: (1) territory establishment, (2…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE