Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
[HTML][HTML] Diversification and obfuscation techniques for software security: A systematic literature review
Context: Diversification and obfuscation are promising techniques for securing software and
protecting computers from harmful malware. The goal of these techniques is not removing …
protecting computers from harmful malware. The goal of these techniques is not removing …
Evaluating code readability and legibility: An examination of human-centric studies
Reading code is an essential activity in software maintenance and evolution. Several
studies with human subjects have investigated how different factors, such as the employed …
studies with human subjects have investigated how different factors, such as the employed …
Code obfuscation against symbolic execution attacks
Code obfuscation is widely used by software developers to protect intellectual property, and
malware writers to hamper program analysis. However, there seems to be little work on …
malware writers to hamper program analysis. However, there seems to be little work on …
A comparison of code similarity analysers
Copying and pasting of source code is a common activity in software engineering. Often, the
code is not copied as it is and it may be modified for various purposes; eg refactoring, bug …
code is not copied as it is and it may be modified for various purposes; eg refactoring, bug …
A human study of comprehension and code summarization
Software developers spend a great deal of time reading and understanding code that is
poorly-documented, written by other developers, or developed using differing styles. During …
poorly-documented, written by other developers, or developed using differing styles. During …
Data augmentation and transfer learning to classify malware images in a deep learning context
In the past few years, malware classification techniques have shifted from shallow traditional
machine learning models to deeper neural network architectures. The main benefit of some …
machine learning models to deeper neural network architectures. The main benefit of some …
How does code obfuscation impact energy usage?
Software piracy is an important concern for application developers. Such concerns are
especially relevant in mobile application development, where piracy rates can approach …
especially relevant in mobile application development, where piracy rates can approach …
A family of experiments to assess the effectiveness and efficiency of source code obfuscation techniques
Context: code obfuscation is intended to obstruct code understanding and, eventually, to
delay malicious code changes and ultimately render it uneconomical. Although code …
delay malicious code changes and ultimately render it uneconomical. Although code …
Partitioning composite code changes to facilitate code review
Developers expend significant effort on reviewing source code changes. Hence, the
comprehensibility of code changes directly affects development productivity. Our prior study …
comprehensibility of code changes directly affects development productivity. Our prior study …
Assessment of source code obfuscation techniques
Obfuscation techniques are a general category of software protections widely adopted to
prevent malicious tampering of the code by making applications more difficult to understand …
prevent malicious tampering of the code by making applications more difficult to understand …