Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Malware classification and composition analysis: A survey of recent developments
Malware detection and classification are becoming more and more challenging, given the
complexity of malware design and the recent advancement of communication and …
complexity of malware design and the recent advancement of communication and …
Protecting software through obfuscation: Can it keep pace with progress in code analysis?
Software obfuscation has always been a controversially discussed research area. While
theoretical results indicate that provably secure obfuscation in general is impossible, its …
theoretical results indicate that provably secure obfuscation in general is impossible, its …
Let a thousand flowers bloom? An early look at large numbers of software app developers and patterns of innovation
KJ Boudreau - Organization Science, 2012 - pubsonline.informs.org
In this paper, I study the effect of adding large numbers of producers of application software
programs (“apps”) to leading handheld computer platforms, from 1999 to 2004. To isolate …
programs (“apps”) to leading handheld computer platforms, from 1999 to 2004. To isolate …
Obfuscation of executable code to improve resistance to static disassembly
C Linn, S Debray - Proceedings of the 10th ACM conference on …, 2003 - dl.acm.org
A great deal of software is distributed in the form of executable code. The ability to reverse
engineer such executables can create opportunities for theft of intellectual property via …
engineer such executables can create opportunities for theft of intellectual property via …
Manufacturing cheap, resilient, and stealthy opaque constructs
It has become common to distribute software in forms that are isomorphic to the original
source code. An important example is Java bytecode. Since such codes are easy to …
source code. An important example is Java bytecode. Since such codes are easy to …
Java quality assurance by detecting code smells
E Van Emden, L Moonen - Ninth Working Conference on …, 2002 - ieeexplore.ieee.org
Software inspection is a known technique for improving software quality. It involves carefully
examining the code, the design, and the documentation of software and checking these for …
examining the code, the design, and the documentation of software and checking these for …
Asteria: Deep learning-based AST-encoding for cross-platform binary code similarity detection
S Yang, L Cheng, Y Zeng, Z Lang… - 2021 51st Annual …, 2021 - ieeexplore.ieee.org
Binary code similarity detection is a fundamental technique for many security applications
such as vulnerability search, patch analysis, and malware detection. There is an increasing …
such as vulnerability search, patch analysis, and malware detection. There is an increasing …
Obfuscation techniques for enhancing software security
Accordingly, Several techniques for technical protection of Software Secrets are provided in
accordance with one embodiment of the present invention. In the detailed description of the …
accordance with one embodiment of the present invention. In the detailed description of the …
Static disassembly of obfuscated binaries
Disassembly is the process of recovering a symbolic representation of a program's machine
code instructions from its binary representation. Recently, a number of techniques have …
code instructions from its binary representation. Recently, a number of techniques have …
[LLIBRE][B] Modern compiler design
" Modern Compiler Design" makes the topic of compiler design more accessible by focusing
on principles and techniques of wide application. By carefully distinguishing between the …
on principles and techniques of wide application. By carefully distinguishing between the …