Hybrid Obfuscation Technique to Protect Source Code From Prohibited Software Reverse Engineering

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Code Obfuscation against Static and Dynamic Reverse Engineering

The process of reverse engineering allows attackers to understand the behavior of software and extract proprietary algorithms and data structures (e.g. cryptographic keys) from it. Code obfuscation is frequently employed to mitigate this risk. However, while most of today’s obfuscation methods are targeted against static reverse engineering, where the attacker analyzes the code without actually...

متن کامل

University of Szeged Department of Software Engineering Modelling and Reverse Engineering C + + Source Code

Factory Builder 2 7 Builder soft 17 9 Factory Method Factory Method soft 1 9 Prototype 1 1 Prototype soft 1 1 Singleton Adapter Class 16 Adapter Class soft 13 16 Adapter Object 54 27 62 Adapter Object soft 62 153 135 Bridge Bridge soft 73 80 Decorator Decorator soft Proxy 36 4 Proxy soft 44 5 Chain of Responsibility Iterator Iterator soft 1 Strategy 4 1 10 5 Strategy soft 12 2 20 32 Template Me...

متن کامل

Source Code Independent Reverse Engineering of Dynamic Web Sites

This paper describes source code independent reverse engineering of dynamic web sites. The tool Revangie builds a form-oriented analysis model solely from the usage of a web application. The recovered models can be, for example, exploited for the purpose of requirements engineering and load test development. Revangie can explore a given web application fully automatically or can passively recor...

متن کامل

Code Obfuscation Techniques for Software Protection

An important security problem is to protect software against malicious host attacks. Since the malicious hosts are responsible for the program’s execution, there seems little the program can do to protect itself from disclosure, tampering and incorrect execution [7]. This paper will review some existing code obfuscation techniques for protecting software against those attacks. We will focus our...

متن کامل

Reverse engineering PLEX - C code to SDL 10 code

Reverse engineering PLEX-C code to SDL10 code Martin Berg 1999 i

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IEEE Access

سال: 2020

ISSN: 2169-3536

DOI: 10.1109/access.2020.3028428