Protecting software through obfuscation: Can it keep pace with progress in code analysis?

S Schrittwieser, S Katzenbeisser, J Kinder… - Acm computing surveys …, 2016 - dl.acm.org
Software obfuscation has always been a controversially discussed research area. While
theoretical results indicate that provably secure obfuscation in general is impossible, its …

A survey of android application and malware hardening

V Sihag, M Vardhan, P Singh - Computer Science Review, 2021 - Elsevier
In the age of increasing mobile and smart connectivity, malware poses an ever evolving
threat to individuals, societies and nations. Anti-malware companies are often the first and …

Blockchain‐enabled data sharing in supply chains: Model, operationalization, and tutorial

Z Wang, Z Zheng, W Jiang… - Production and …, 2021 - journals.sagepub.com
Data sharing between upstream and downstream entities is vital for the success of a supply
chain. However, distrust, privacy concerns, data misuse, and the asymmetric valuation of …

Keysplitwatermark: Zero watermarking algorithm for software protection against cyber-attacks

C Iwendi, Z Jalil, AR Javed, T Reddy, R Kaluri… - IEEe …, 2020 - ieeexplore.ieee.org
Cyber-attacks are evolving at a disturbing rate. Data breaches, ransomware attacks, crypto-
jacking, malware and phishing attacks are now rampant. In this era of cyber warfare, the …

Obfuscator-LLVM--software protection for the masses

P Junod, J Rinaldini, J Wehrli… - 2015 ieee/acm 1st …, 2015 - ieeexplore.ieee.org
Software security with respect to reverse-engineering is a challenging discipline that has
been researched for several years and which is still active. At the same time, this field is …

SoK: Automated software diversity

P Larsen, A Homescu, S Brunthaler… - 2014 IEEE Symposium …, 2014 - ieeexplore.ieee.org
The idea of automatic software diversity is at least two decades old. The deficiencies of
currently deployed defenses and the transition to online software distribution (the" App store" …

Limits of static analysis for malware detection

A Moser, C Kruegel, E Kirda - Twenty-third annual computer …, 2007 - ieeexplore.ieee.org
Malicious code is an increasingly important problem that threatens the security of computer
systems. The traditional line of defense against malware is composed of malware detectors …

Droidchameleon: evaluating android anti-malware against transformation attacks

V Rastogi, Y Chen, X Jiang - Proceedings of the 8th ACM SIGSAC …, 2013 - dl.acm.org
Mobile malware threats have recently become a real concern. In this paper, we evaluate the
state-of-the-art commercial mobile antimalware products for Android and test how resistant …

Code obfuscation against symbolic execution attacks

S Banescu, C Collberg, V Ganesh… - Proceedings of the …, 2016 - dl.acm.org
Code obfuscation is widely used by software developers to protect intellectual property, and
malware writers to hamper program analysis. However, there seems to be little work on …

A survey of strategy-driven evasion methods for PE malware: Transformation, concealment, and attack

J Geng, J Wang, Z Fang, Y Zhou, D Wu, W Ge - Computers & Security, 2024 - Elsevier
The continuous proliferation of malware poses a formidable threat to the cyberspace
landscape. Researchers have proffered a multitude of sophisticated defense mechanisms …