Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Evaluation methodologies in software protection research
Man-at-the-end (MATE) attackers have full control over the system on which the attacked
software runs, and try to break the confidentiality or integrity of assets embedded in the …
software runs, and try to break the confidentiality or integrity of assets embedded in the …
Loki: Hardening code obfuscation against automated attacks
Software obfuscation is a crucial technology to protect intellectual property and manage
digital rights within our society. Despite its huge practical importance, both commercial and …
digital rights within our society. Despite its huge practical importance, both commercial and …
MDGraph: A novel malware detection method based on memory dump and graph neural network
Malware detection is of great importance to computer security. Although the malware
detection approaches have made great progress in recent years, these methods are still …
detection approaches have made great progress in recent years, these methods are still …
A novel malware detection method based on API embedding and API parameters
Malware is becoming increasingly prevalent in recent years with the widespread
deployment of the information system. Many malicious programs pose a great threat to …
deployment of the information system. Many malicious programs pose a great threat to …
Technical Report: Hardening Code Obfuscation Against Automated Attacks
Software obfuscation is a crucial technology to protect intellectual property and manage
digital rights within our society. Despite its huge practical importance, both commercial and …
digital rights within our society. Despite its huge practical importance, both commercial and …
Rope: Covert multi-process malware execution with return-oriented programming
Distributed execution designs challenge behavioral analyses of anti-malware solutions by
spreading seemingly benign chunks of a malicious payload to multiple processes …
spreading seemingly benign chunks of a malicious payload to multiple processes …
Dynamic taint analysis versus obfuscated self-checking
Software protection in practice addresses the yearly loss of tens of billion USD for software
manufacturers, a result of malicious end-users tampering with the software (” software …
manufacturers, a result of malicious end-users tampering with the software (” software …
[PDF][PDF] Rope: Bypassing behavioral detection of malware with distributed ROP-driven execution
DC D'Elia, L Invidia - Black Hat USA, 2021 - i.blackhat.com
Rope is a new covert design for distributed malware execution. Rope malware samples are
payloads expressed in return-oriented programming and divided into chunks that pre …
payloads expressed in return-oriented programming and divided into chunks that pre …
Security-as-a-Service with Cyberspace Mimic Defense Technologies in Cloud
J Wang, J Pang, J Wei - … of Pioneering Computer Scientists, Engineers and …, 2021 - Springer
Users usually focus on the application-level requirements which are quite friendly and direct
to them. However, there are no existing tools automating the application-level requirements …
to them. However, there are no existing tools automating the application-level requirements …
[PDF][PDF] Evaluation Methodologies in Software Protection Research—Supplemental Material
B DE SUTTER, S SCHRITTWIESER, B COPPENS… - users.elis.ugent.be
1 Overview This supplemental material categorizes all papers according to their perspective
(Section 2), lists our definitions of software protection methods (Section 3), analysis methods …
(Section 2), lists our definitions of software protection methods (Section 3), analysis methods …