Sciweavers

88 search results - page 1 / 18
» The effectiveness of source code obfuscation: An experimenta...
Sort
View
IWPC
2009
IEEE
13 years 11 months ago
The effectiveness of source code obfuscation: An experimental assessment
Source code obfuscation is a protection mechanism widely used to limit the possibility of malicious reverse engineering or attack activities on a software system. Although several...
Mariano Ceccato, Massimiliano Di Penta, Jasvir Nag...
IWPC
2007
IEEE
13 years 10 months ago
Metrics for Measuring the Effectiveness of Decompilers and Obfuscators
Java developers often use decompilers to aid reverse engineering and obfuscators to prevent it. Decompilers translate low-level class files to Java source and can produce “good...
Nomair A. Naeem, Michael Batchelder, Laurie J. Hen...
CCS
2008
ACM
13 years 6 months ago
Towards experimental evaluation of code obfuscation techniques
While many obfuscation schemes proposed, none of them satisfy any strong definition of obfuscation. Furthermore secure generalpurpose obfuscation algorithms have been proven to be...
Mariano Ceccato, Massimiliano Di Penta, Jasvir Nag...
APSEC
1999
IEEE
13 years 8 months ago
An Approach for Measuring Software Evolution Using Source Code Features
One of the characteristics of large software systems is that they evolve over time. Evolution patterns include modifications related to the implementation, interfaces and the over...
Ladan Tahvildari, Richard Gregory, Kostas Kontogia...
DRM
2005
Springer
13 years 10 months ago
Control flow based obfuscation
A software obfuscator is a program O to transform a source program P for protection against malicious reverse engineering. O should be correct (O(P) has same functionality with P)...
Jun Ge, Soma Chaudhuri, Akhilesh Tyagi