2017 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET) 2017
DOI: 10.1109/wispnet.2017.8299877
|View full text |Cite
|
Sign up to set email alerts
|

A code obfuscation technique to prevent reverse engineering

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
2
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(2 citation statements)
references
References 10 publications
0
2
0
Order By: Relevance
“…A determined attacker, after spending enough time to inspect obfuscated code, might locate the functionality to alter the functions and succeed. The renaming obfuscation, layout obfuscation, and source code obfuscation can be attacked by the reversing tools that are able to perform analysis to create a new name for the identifiers that are used in the source file [8].…”
Section: Introductionmentioning
confidence: 99%
“…A determined attacker, after spending enough time to inspect obfuscated code, might locate the functionality to alter the functions and succeed. The renaming obfuscation, layout obfuscation, and source code obfuscation can be attacked by the reversing tools that are able to perform analysis to create a new name for the identifiers that are used in the source file [8].…”
Section: Introductionmentioning
confidence: 99%
“…comments, change overall layout of the code, and jumble the identifiers. Still the reversing debugger can analyze and create better arranged code [15].…”
mentioning
confidence: 99%