Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 233,247,743 papers from all fields of science
Search
Sign In
Create Free Account
Obfuscation (software)
Known as:
Obfuscator
, Obfuscated code
, Obfuscating software
Expand
In software development, manual obfuscation is the deliberate act of creating obfuscated code, i.e. source or machine code that is difficult for…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
31 relations
Anti-tamper software
Backdoor (computing)
Business models for open-source software
C++
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2015
2015
Harvesting Runtime Data in Android Applications for Identifying Malware and Enhancing Code Analysis
Siegfried Rasthofer
,
Steven Arzt
,
Marc Miltenberger
,
E. Bodden
2015
Corpus ID: 3007475
It is generally a challenging task to tell apart malware from benign applications: obfuscation and string encryption, used by…
Expand
2014
2014
Deobfuscation based on edit distance algorithm for spam filitering
Xinwang Zhong
International Conference on Machine Learning and…
2014
Corpus ID: 31011912
Spamming problem has been grown rapidly in the Internet. An adversary obfuscates the spam message by misspelling or inserting…
Expand
2013
2013
Malicious Website Detection Based on Honeypot Systems
Tung-Ming Koo
,
Hung-Chang Chang
,
Ya-Ting Hsu
,
Huey-Yeh Lin
IEEE International Conference on Computational…
2013
Corpus ID: 62190665
In the Internet age, every computer user is likely to inadvertently encounter highly contagious viruses. Over the past several…
Expand
2012
2012
A General Paradigm for Normalizing Metamorphic Malwares
Seyed Emad Armoun
,
S. Hashemi
International Conference on Frontiers of…
2012
Corpus ID: 15036737
Nowadays malwares are one of the most important problems of computer society and even people society according to the expansion…
Expand
Review
2012
Review
2012
Obfuscation of Stuxnet and Flame Malware
Ravish Goyal
,
Sushant Sharma
,
S. Bevinakoppa
,
P. Watters
2012
Corpus ID: 17986796
Malware is defined as a sequence of instructions performing actions intended by an attacker or hacker without the consent of the…
Expand
2007
2007
Hidden problems of asynchronous proactive recovery
Paulo Sousa
,
N. Neves
,
P. Veríssimo
2007
Corpus ID: 12403052
A node-exhaustion-safe intrusion-tolerant distributed system is a system that assuredly does not suffer more than the assumed…
Expand
2004
2004
Electronic Voting Systems Is Brazil ahead of its time
Pedro A. D. Rezende
2004
Corpus ID: 14897796
In May 2001, from the losing end of a fierce internal power dispute, the president of the Brazilian Senate publicly admitted to…
Expand
Highly Cited
2003
Highly Cited
2003
The Research of Mobile Agent Security
Xiaobin Li
,
Ai-juan Zhang
,
Jinfei Sun
,
Zhaolin Yin
International Conference on Grid and Cooperative…
2003
Corpus ID: 38201498
Mobile Agent Security plays an important role in the application of Mobile Agent. This paper analyzes the security threats of…
Expand
2003
2003
Obfuscated instructions for software protection
Akito Monden
,
A. Monsifrot
,
C. Thomborson
2003
Corpus ID: 17373972
Many computer systems are designed to make it easy for end-users to install and update software. An undesirable side-effect, from…
Expand
2002
2002
Self-Protecting Mobile Agents Obfuscation Techniques Evaluation Report
L. Badger
,
Larry D'Anna
,
D. Kilpatrick
,
B. Matt
,
Andrew Reisse
,
T. Van
2002
Corpus ID: 16607540
This document presents an analysis of various program obfuscation techniques performed as part of the Self-Protecting Mobile…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE