Skip to search formSkip to main contentSkip to account menu

Obfuscation (software)

Known as: Obfuscator, Obfuscated code, Obfuscating software 
In software development, manual obfuscation is the deliberate act of creating obfuscated code, i.e. source or machine code that is difficult for… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2015
2015
It is generally a challenging task to tell apart malware from benign applications: obfuscation and string encryption, used by… 
2014
2014
Spamming problem has been grown rapidly in the Internet. An adversary obfuscates the spam message by misspelling or inserting… 
2013
2013
In the Internet age, every computer user is likely to inadvertently encounter highly contagious viruses. Over the past several… 
2012
2012
Nowadays malwares are one of the most important problems of computer society and even people society according to the expansion… 
Review
2012
Review
2012
Malware is defined as a sequence of instructions performing actions intended by an attacker or hacker without the consent of the… 
2007
2007
A node-exhaustion-safe intrusion-tolerant distributed system is a system that assuredly does not suffer more than the assumed… 
2004
2004
In May 2001, from the losing end of a fierce internal power dispute, the president of the Brazilian Senate publicly admitted to… 
Highly Cited
2003
Highly Cited
2003
Mobile Agent Security plays an important role in the application of Mobile Agent. This paper analyzes the security threats of… 
2003
2003
Many computer systems are designed to make it easy for end-users to install and update software. An undesirable side-effect, from… 
2002
2002
This document presents an analysis of various program obfuscation techniques performed as part of the Self-Protecting Mobile…