2019 International Conference on Cyber Security and Protection of Digital Services (Cyber Security) 2019
DOI: 10.1109/cybersecpods.2019.8885094
|View full text |Cite
|
Sign up to set email alerts
|

Analysis of Obfuscated Code with Program Slicing

Abstract: In Man-At-The-End (MATE) attacks, software apps run on a device under full control of the attackers: they can violate the intellectual property of the app by means of malicious reverse engineering, software piracy, and software tampering. Obfuscation is a technique that is widely adopted by developers to mitigate this problem. Obfuscation increases complexity of software code, by obscuring the structure of code and data in order to thwart the reverse engineering process. However, it is possible to reverse engi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
3
1
1

Relationship

0
5

Authors

Journals

citations
Cited by 6 publications
(2 citation statements)
references
References 21 publications
(23 reference statements)
0
2
0
Order By: Relevance
“…It is continuously updated and maintained [90]; it contains many samples and diverse categories. [53]. C, Java, and Python are the most common programming languages.…”
Section: Analysis Based On Empirical Strategy and Dataset (Rq3 And Rq31)mentioning
confidence: 99%
“…It is continuously updated and maintained [90]; it contains many samples and diverse categories. [53]. C, Java, and Python are the most common programming languages.…”
Section: Analysis Based On Empirical Strategy and Dataset (Rq3 And Rq31)mentioning
confidence: 99%
“…In [33], the resilience of obfuscated C code was measured using program slicing. By measuring the resilience, they measured the degree of resistance to automated deobfuscation tools.…”
Section: B Software Obfuscation Techniquesmentioning
confidence: 99%