2020
DOI: 10.1109/access.2020.3008905
|View full text |Cite
|
Sign up to set email alerts
|

SCORE: Source Code Optimization & REconstruction

Abstract: The main goal of obfuscation is to make software difficult to analyze. Although obfuscation is one useful method to protect programs, the ability to analyze malware is greatly reduced if used for malicious purposes. The obfuscation technique is most applicable at the binary level, but it can also be applied at the source code level. Although source-level techniques can be applied regardless of the target platform, these are often optimized and eliminated during compilation. However, when controlflow obfuscatio… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3

Citation Types

0
3
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
2
2
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(3 citation statements)
references
References 16 publications
(30 reference statements)
0
3
0
Order By: Relevance
“…This encryption makes it difficult for attackers to obtain, analyze, and use these code segments, data segments, and control flow information to launch attacks and effectively reduces the threat of code reuse attacks. Encryption of sensitive data related to control flow information can be implemented from both software [ 26 , 27 ] and hardware [ 28 , 29 ] perspectives. Software implementations offer advantages such as strong flexibility.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…This encryption makes it difficult for attackers to obtain, analyze, and use these code segments, data segments, and control flow information to launch attacks and effectively reduces the threat of code reuse attacks. Encryption of sensitive data related to control flow information can be implemented from both software [ 26 , 27 ] and hardware [ 28 , 29 ] perspectives. Software implementations offer advantages such as strong flexibility.…”
Section: Related Workmentioning
confidence: 99%
“…Software encryption implementation mainly involves obfuscation-based mechanisms [ 9 , 26 ] and dynamic encryption mechanisms based on encryption algorithms. Li designed an obfuscation algorithm for program control flow graphs.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation