Control flow obfuscation technology based on random insertion

被引:0
|
作者
机构
[1] Sun, Yongyong
来源
Sun, Yongyong (yongsunjd@126.com) | 1600年 / Universidad Central de Venezuela卷 / 55期
关键词
Branch Insertion - Bytecodes - Control flow obfuscations - Insertion algorithms - Obfuscation transformations - Random functions - Random insertions - Technology-based;
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
相关论文
共 50 条
  • [31] Parameterized decomposition tree-based obfuscation method with double flattening control flow
    Zhou, Na-Qin
    Qi, De-Yu
    Huanan Ligong Daxue Xuebao/Journal of South China University of Technology (Natural Science), 2015, 43 (05): : 132 - 138
  • [32] Integrated Software Fingerprinting via Neural-Network-Based Control Flow Obfuscation
    Ma, Haoyu
    Li, Ruiqi
    Yu, Xiaoxu
    Jia, Chunfu
    Gao, Debin
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2016, 11 (10) : 2322 - 2337
  • [33] Research on Code Obfuscation Based on Maze Protection Technology
    Wang, Zhiyue
    Wu, Weimin
    Ma, Wenrui
    Li, Jinliang
    Huang, Zhiwei
    MECHATRONICS, ROBOTICS AND AUTOMATION, PTS 1-3, 2013, 373-375 : 1691 - +
  • [34] Research on deformation based binary code obfuscation technology
    Wang, Huai-Jun
    Fang, Ding-Yi
    Li, Guang-Hui
    Zhang, Cong
    Jiang, He
    Sichuan Daxue Xuebao (Gongcheng Kexue Ban)/Journal of Sichuan University (Engineering Science Edition), 2014, 46 (01): : 14 - 21
  • [35] A framework for quantitative evaluation of parallel control-flow obfuscation
    Huang, Yu-Lun
    Tsai, Hsin-Yi
    COMPUTERS & SECURITY, 2012, 31 (08) : 886 - 896
  • [36] RTL Hardware IP Protection Using Key-Based Control and Data Flow Obfuscation
    Chakraborty, Rajat Subhra
    Bhunia, Swarup
    23RD INTERNATIONAL CONFERENCE ON VLSI DESIGN, 2010, : 405 - 410
  • [37] Three control flow obfuscation methods for Java']Java software
    Hou, T. W.
    Chen, H. Y.
    Tsai, M. H.
    IEE PROCEEDINGS-SOFTWARE, 2006, 153 (02): : 80 - 86
  • [38] θ-Rand: Random Noise-based Location Obfuscation Based on Circle Sectors
    Wightman, P.
    Zurbaran, M.
    Zurek, E.
    Salazar, A.
    Jabba, D.
    Jimeno, M.
    2013 IEEE SYMPOSIUM ON INDUSTRIAL ELECTRONICS & APPLICATIONS (ISIEA 2013), 2013, : 100 - 104
  • [39] A method of data obfuscation based on Monte Carlo random Monotone function
    Qin, Yannan
    Li, Lin
    Zhang, Yongxin
    Ding, Yanhui
    2017 IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND ENGINEERING (CSE) AND IEEE/IFIP INTERNATIONAL CONFERENCE ON EMBEDDED AND UBIQUITOUS COMPUTING (EUC), VOL 1, 2017, : 752 - 755
  • [40] Obfuscation Techniques Based on Random Strings Used in Malicious VBA Scripts
    Marilena, Lupascu
    2022 24TH INTERNATIONAL SYMPOSIUM ON SYMBOLIC AND NUMERIC ALGORITHMS FOR SCIENTIFIC COMPUTING, SYNASC, 2022, : 347 - 352