Control flow obfuscation technology based on random insertion

被引:0
|
作者
机构
[1] Sun, Yongyong
来源
Sun, Yongyong (yongsunjd@126.com) | 1600年 / Universidad Central de Venezuela卷 / 55期
关键词
Branch Insertion - Bytecodes - Control flow obfuscations - Insertion algorithms - Obfuscation transformations - Random functions - Random insertions - Technology-based;
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
相关论文
共 50 条
  • [1] Compiling method for obfuscation technology based on crossing control-flow
    Fu J.-J.
    Wang K.
    Zhejiang Daxue Xuebao (Gongxue Ban)/Journal of Zhejiang University (Engineering Science), 2010, 44 (05): : 903 - 909
  • [2] Semantic redirection obfuscation: A control flow obfuscation based on Android Runtime
    Wang, Zhichao
    Shan, Yiwei
    Yang, Zhi
    Wang, Ruoyi
    Song, Shuang
    2020 IEEE 19TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2020), 2020, : 1756 - 1763
  • [3] Program obfuscation scheme using random numbers to complicate control flow
    Toyofuku, T
    Tabata, T
    Sakurai, K
    EMBEDDED AND UBIQUITOUS COMPUTING - EUC 2005 WORKSHOPS, PROCEEDINGS, 2005, 3823 : 916 - 925
  • [4] Software protection algorithm based on control flow obfuscation
    Sun Y.
    Sun, Yongyong (yongsunjd@126.com), 2018, Totem Publishers Ltd (14) : 2181 - 2188
  • [5] A Parameterized Flattening Control Flow Based Obfuscation Algorithm with Opaque Predicate for Reduplicate Obfuscation
    Liang, Zheheng
    Li, Wenin
    Guo, Jing
    Qi, Deyu
    Zeng, Jijun
    PROCEEDINGS OF 2017 IEEE INTERNATIONAL CONFERENCE ON PROGRESS IN INFORMATICS AND COMPUTING (PIC 2017), 2017, : 372 - 378
  • [6] Control Flow Obfuscation Based Protection Method for Android Applications
    Peng, Yong
    Su, Guanyu
    Tian, Bin
    Sun, Maohua
    Li, Qi
    CHINA COMMUNICATIONS, 2017, 14 (11) : 247 - 259
  • [7] Control Flow Obfuscation Based Protection Method for Android Applications
    Yong Peng
    Guanyu Su
    Bin Tian
    Maohua Sun
    Qi Li
    中国通信, 2017, 14 (11) : 247 - 259
  • [8] Deep Control Flow Obfuscation Model Based on Callback Function
    Sha Z.-H.
    Shu H.
    Wu C.-G.
    Xiong X.-B.
    Kang F.
    Ruan Jian Xue Bao/Journal of Software, 2022, 33 (05): : 1833 - 1848
  • [9] Technique of Source Code Obfuscation Based on Data Flow and Control FLow Tansformations
    Su Qing
    Wang Zhi-yue
    Wu Wei-min
    Li Jing-liang
    Huang Zhi-wei
    PROCEEDINGS OF 2012 7TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE & EDUCATION, VOLS I-VI, 2012, : 1093 - 1097
  • [10] Control flow obfuscation for Android applications
    Balachandran, Vivek
    Sufatrio
    Tan, Darell J. J.
    Thing, Vrizlynn L. L.
    COMPUTERS & SECURITY, 2016, 61 : 72 - 93