[HTML][HTML] Diversification and obfuscation techniques for software security: A systematic literature review

S Hosseinzadeh, S Rauti, S Laurén, JM Mäkelä… - Information and …, 2018‏ - Elsevier
Context: Diversification and obfuscation are promising techniques for securing software and
protecting computers from harmful malware. The goal of these techniques is not removing …

Evaluation methodologies in software protection research

B De Sutter, S Schrittwieser, B Coppens… - ACM Computing …, 2024‏ - dl.acm.org
Man-at-the-end (MATE) attackers have full control over the system on which the attacked
software runs, and try to break the confidentiality or integrity of assets embedded in the …

Srcmarker: Dual-channel source code watermarking via scalable code transformations

B Yang, W Li, L **ang, B Li - 2024 IEEE Symposium on Security …, 2024‏ - ieeexplore.ieee.org
The expansion of the open source community and the rise of large language models have
raised ethical and security concerns on the distribution of source code, such as misconduct …

A framework to quantify the quality of source code obfuscation

H **, J Lee, S Yang, K Kim, DH Lee - Applied Sciences, 2024‏ - mdpi.com
Malicious reverse engineering of software has served as a valuable technique for attackers
to infringe upon and steal intellectual property. We can employ obfuscation techniques to …

Towards code watermarking with dual-channel transformations

B Yang, W Li, L **ang, B Li - arxiv preprint arxiv:2309.00860, 2023‏ - arxiv.org
The expansion of the open source community and the rise of large language models have
raised ethical and security concerns on the distribution of source code, such as misconduct …

Software watermarking: Progress and challenges

A Dey, S Bhattacharya, N Chaki - INAE Letters, 2019‏ - Springer
In this paper, we present a brief survey on software watermarking methods that explains the
prospects and constraints of most software watermarking algorithms. We introduce a …

Effectiveness of android obfuscation on evading anti-malware

M Chua, V Balachandran - Proceedings of the eighth ACM conference …, 2018‏ - dl.acm.org
Obfuscation techniques have been conventionally used for legitimate applications, including
preventing application reverse engineering, tampering and protecting intellectual property. A …

[HTML][HTML] Enhance virtual-machine-based code obfuscation security through dynamic bytecode scheduling

K Kuang, Z Tang, X Gong, D Fang, X Chen, Z Wang - Computers & Security, 2018‏ - Elsevier
Code virtualization built upon virtual machine (VM) technologies is emerging as a viable
method for implementing code obfuscation to protect programs against unauthorized …

Smartmark: Software watermarking scheme for smart contracts

T Kim, Y Jang, C Lee, H Koo… - 2023 IEEE/ACM 45th …, 2023‏ - ieeexplore.ieee.org
A smart contract is a self-executing program on a blockchain to ensure an immutable and
transparent agreement without the involvement of intermediaries. Despite its growing …

Proactive schemes: A survey of adversarial attacks for social good

V Asnani, X Yin, X Liu - arxiv preprint arxiv:2409.16491, 2024‏ - arxiv.org
Adversarial attacks in computer vision exploit the vulnerabilities of machine learning models
by introducing subtle perturbations to input data, often leading to incorrect predictions or …