Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Protecting software through obfuscation: Can it keep pace with progress in code analysis?
Software obfuscation has always been a controversially discussed research area. While
theoretical results indicate that provably secure obfuscation in general is impossible, its …
theoretical results indicate that provably secure obfuscation in general is impossible, its …
A survey of android application and malware hardening
In the age of increasing mobile and smart connectivity, malware poses an ever evolving
threat to individuals, societies and nations. Anti-malware companies are often the first and …
threat to individuals, societies and nations. Anti-malware companies are often the first and …
Blockchain‐enabled data sharing in supply chains: Model, operationalization, and tutorial
Z Wang, Z Zheng, W Jiang… - Production and …, 2021 - journals.sagepub.com
Data sharing between upstream and downstream entities is vital for the success of a supply
chain. However, distrust, privacy concerns, data misuse, and the asymmetric valuation of …
chain. However, distrust, privacy concerns, data misuse, and the asymmetric valuation of …
Keysplitwatermark: Zero watermarking algorithm for software protection against cyber-attacks
Cyber-attacks are evolving at a disturbing rate. Data breaches, ransomware attacks, crypto-
jacking, malware and phishing attacks are now rampant. In this era of cyber warfare, the …
jacking, malware and phishing attacks are now rampant. In this era of cyber warfare, the …
Obfuscator-LLVM--software protection for the masses
P Junod, J Rinaldini, J Wehrli… - 2015 ieee/acm 1st …, 2015 - ieeexplore.ieee.org
Software security with respect to reverse-engineering is a challenging discipline that has
been researched for several years and which is still active. At the same time, this field is …
been researched for several years and which is still active. At the same time, this field is …
SoK: Automated software diversity
The idea of automatic software diversity is at least two decades old. The deficiencies of
currently deployed defenses and the transition to online software distribution (the" App store" …
currently deployed defenses and the transition to online software distribution (the" App store" …
Limits of static analysis for malware detection
Malicious code is an increasingly important problem that threatens the security of computer
systems. The traditional line of defense against malware is composed of malware detectors …
systems. The traditional line of defense against malware is composed of malware detectors …
Droidchameleon: evaluating android anti-malware against transformation attacks
Mobile malware threats have recently become a real concern. In this paper, we evaluate the
state-of-the-art commercial mobile antimalware products for Android and test how resistant …
state-of-the-art commercial mobile antimalware products for Android and test how resistant …
Code obfuscation against symbolic execution attacks
Code obfuscation is widely used by software developers to protect intellectual property, and
malware writers to hamper program analysis. However, there seems to be little work on …
malware writers to hamper program analysis. However, there seems to be little work on …
A survey of strategy-driven evasion methods for PE malware: Transformation, concealment, and attack
The continuous proliferation of malware poses a formidable threat to the cyberspace
landscape. Researchers have proffered a multitude of sophisticated defense mechanisms …
landscape. Researchers have proffered a multitude of sophisticated defense mechanisms …