In the past decade, there have been many well-publicized cases of source code leaking from different well-known companies. These leaks pose a serious problem when the source code contains sen-sitive information encoded in its identifier names and comments. Unfortunately, redacting the sensitive information requires obfus-cating the identifiers, which will quickly interfere with program comprehension. Program comprehension is key for programmers in understanding the source code, so sensitive information is often left un-redacted. To address this problem, we offer a novel approach for REdact-ing Sensitive Information in Software arTifacts (RESIST). RESIST finds and replaces sensitive words in software artifacts in such a way to reduce the imp...
Software refactoring is a behavior-preserving activity to improve the source code quality without ch...
Code protections aim at blocking (or at least delaying) reverse engineering and tampering attacks to...
With the advancement of reverse engineering technology, the rise in software piracy and program hack...
Software refactoring is the activity associated with developers changing the internal structure of s...
It has been recently demonstrated, in dramatic fashion, that sensitive information thought to be obl...
Context: code obfuscation is intended to obstruct code understanding and, eventually, to delay malic...
Software often contains proprietary information --- algorithms, intellectual property, and encryptio...
Code protections aim at blocking (or at least delaying) reverse engineering and tampering attacks t...
Source code obfuscation is a protection mechanism widely used to limit the possibility of malicious ...
Software, over the years, has evolved from free code given along with the hardware for free to a val...
Source code readability is critical to software quality assurance and maintenance. In this paper, we...
So far tamper-resistance has been considered as a prop-erty such as information stored in (I device ...
Much of what is written about a software project is soon forgotten. Software repositories are full o...
Source code obfuscation is a protection mechanism widely used to limit the possibility of malicious ...
Obfuscation (Obfu) is a practice to make the programming code complicated to protect the Intellectu...
Software refactoring is a behavior-preserving activity to improve the source code quality without ch...
Code protections aim at blocking (or at least delaying) reverse engineering and tampering attacks to...
With the advancement of reverse engineering technology, the rise in software piracy and program hack...
Software refactoring is the activity associated with developers changing the internal structure of s...
It has been recently demonstrated, in dramatic fashion, that sensitive information thought to be obl...
Context: code obfuscation is intended to obstruct code understanding and, eventually, to delay malic...
Software often contains proprietary information --- algorithms, intellectual property, and encryptio...
Code protections aim at blocking (or at least delaying) reverse engineering and tampering attacks t...
Source code obfuscation is a protection mechanism widely used to limit the possibility of malicious ...
Software, over the years, has evolved from free code given along with the hardware for free to a val...
Source code readability is critical to software quality assurance and maintenance. In this paper, we...
So far tamper-resistance has been considered as a prop-erty such as information stored in (I device ...
Much of what is written about a software project is soon forgotten. Software repositories are full o...
Source code obfuscation is a protection mechanism widely used to limit the possibility of malicious ...
Obfuscation (Obfu) is a practice to make the programming code complicated to protect the Intellectu...
Software refactoring is a behavior-preserving activity to improve the source code quality without ch...
Code protections aim at blocking (or at least delaying) reverse engineering and tampering attacks to...
With the advancement of reverse engineering technology, the rise in software piracy and program hack...