Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
[HTML][HTML] Diversification and obfuscation techniques for software security: A systematic literature review
Context: Diversification and obfuscation are promising techniques for securing software and
protecting computers from harmful malware. The goal of these techniques is not removing …
protecting computers from harmful malware. The goal of these techniques is not removing …
Evaluation methodologies in software protection research
Man-at-the-end (MATE) attackers have full control over the system on which the attacked
software runs, and try to break the confidentiality or integrity of assets embedded in the …
software runs, and try to break the confidentiality or integrity of assets embedded in the …
Srcmarker: Dual-channel source code watermarking via scalable code transformations
The expansion of the open source community and the rise of large language models have
raised ethical and security concerns on the distribution of source code, such as misconduct …
raised ethical and security concerns on the distribution of source code, such as misconduct …
A framework to quantify the quality of source code obfuscation
Malicious reverse engineering of software has served as a valuable technique for attackers
to infringe upon and steal intellectual property. We can employ obfuscation techniques to …
to infringe upon and steal intellectual property. We can employ obfuscation techniques to …
Towards code watermarking with dual-channel transformations
The expansion of the open source community and the rise of large language models have
raised ethical and security concerns on the distribution of source code, such as misconduct …
raised ethical and security concerns on the distribution of source code, such as misconduct …
Software watermarking: Progress and challenges
In this paper, we present a brief survey on software watermarking methods that explains the
prospects and constraints of most software watermarking algorithms. We introduce a …
prospects and constraints of most software watermarking algorithms. We introduce a …
Effectiveness of android obfuscation on evading anti-malware
Obfuscation techniques have been conventionally used for legitimate applications, including
preventing application reverse engineering, tampering and protecting intellectual property. A …
preventing application reverse engineering, tampering and protecting intellectual property. A …
[HTML][HTML] Enhance virtual-machine-based code obfuscation security through dynamic bytecode scheduling
Code virtualization built upon virtual machine (VM) technologies is emerging as a viable
method for implementing code obfuscation to protect programs against unauthorized …
method for implementing code obfuscation to protect programs against unauthorized …
Smartmark: Software watermarking scheme for smart contracts
A smart contract is a self-executing program on a blockchain to ensure an immutable and
transparent agreement without the involvement of intermediaries. Despite its growing …
transparent agreement without the involvement of intermediaries. Despite its growing …
Proactive schemes: A survey of adversarial attacks for social good
Adversarial attacks in computer vision exploit the vulnerabilities of machine learning models
by introducing subtle perturbations to input data, often leading to incorrect predictions or …
by introducing subtle perturbations to input data, often leading to incorrect predictions or …