[HTML][HTML] Diversification and obfuscation techniques for software security: A systematic literature review

S Hosseinzadeh, S Rauti, S Laurén, JM Mäkelä… - Information and …, 2018 - Elsevier
Context: Diversification and obfuscation are promising techniques for securing software and
protecting computers from harmful malware. The goal of these techniques is not removing …

Evaluating code readability and legibility: An examination of human-centric studies

D Oliveira, R Bruno, F Madeiral… - 2020 IEEE International …, 2020 - ieeexplore.ieee.org
Reading code is an essential activity in software maintenance and evolution. Several
studies with human subjects have investigated how different factors, such as the employed …

Code obfuscation against symbolic execution attacks

S Banescu, C Collberg, V Ganesh… - Proceedings of the …, 2016 - dl.acm.org
Code obfuscation is widely used by software developers to protect intellectual property, and
malware writers to hamper program analysis. However, there seems to be little work on …

A comparison of code similarity analysers

C Ragkhitwetsagul, J Krinke, D Clark - Empirical Software Engineering, 2018 - Springer
Copying and pasting of source code is a common activity in software engineering. Often, the
code is not copied as it is and it may be modified for various purposes; eg refactoring, bug …

A human study of comprehension and code summarization

S Stapleton, Y Gambhir, A LeClair, Z Eberhart… - Proceedings of the 28th …, 2020 - dl.acm.org
Software developers spend a great deal of time reading and understanding code that is
poorly-documented, written by other developers, or developed using differing styles. During …

Data augmentation and transfer learning to classify malware images in a deep learning context

N Marastoni, R Giacobazzi, M Dalla Preda - Journal of Computer Virology …, 2021 - Springer
In the past few years, malware classification techniques have shifted from shallow traditional
machine learning models to deeper neural network architectures. The main benefit of some …

How does code obfuscation impact energy usage?

C Sahin, P Tornquist, R McKenna… - 2014 IEEE …, 2014 - ieeexplore.ieee.org
Software piracy is an important concern for application developers. Such concerns are
especially relevant in mobile application development, where piracy rates can approach …

A family of experiments to assess the effectiveness and efficiency of source code obfuscation techniques

M Ceccato, M Di Penta, P Falcarin, F Ricca… - Empirical Software …, 2014 - Springer
Context: code obfuscation is intended to obstruct code understanding and, eventually, to
delay malicious code changes and ultimately render it uneconomical. Although code …

Partitioning composite code changes to facilitate code review

Y Tao, S Kim - 2015 IEEE/ACM 12th Working Conference on …, 2015 - ieeexplore.ieee.org
Developers expend significant effort on reviewing source code changes. Hence, the
comprehensibility of code changes directly affects development productivity. Our prior study …

Assessment of source code obfuscation techniques

A Viticchié, L Regano, M Torchiano… - 2016 IEEE 16th …, 2016 - ieeexplore.ieee.org
Obfuscation techniques are a general category of software protections widely adopted to
prevent malicious tampering of the code by making applications more difficult to understand …