A method is developed for assessing the practical persistence of obfuscating transformations of programs based on the calculation of the similarity index for the original, obfuscated and deobfuscated programs. Candidates are proposed for similarity indices, which are based on such program characteristics as the control flow graph, symbolic execution time and degree of coverage for symbolic execution. The control flow graph is considered as the basis for building other candidates for program similarity indicators. On its basis, a new candidate is proposed for the similarity index, which, when calculated, finds the Hamming distance between the adjacency matrices of control flow graphs of compared programs. A scheme for estimating (analyzing) ...
Source code similarity detection has extensive applications in computer programming teaching and sof...
In this technical report, we discuss the use of code obfuscation as means of protecting the intellec...
Abstract—We present an obfuscation strategy to protect a program against injection attacks. The stra...
Obfuscation is used to protect programs from analysis and reverse engineering. There are theoretical...
Abstract—Modern obfuscation techniques are intended to dis-courage reverse engineering and malicious...
A software obfuscator is a program O to transform a source program P for protection against maliciou...
A set of algorithms of programming modules obfuscation is synthesized, which differs from the known ...
This report addresses de-obfuscation on programs. The targeted obfuscation scheme is the control flo...
Abstract Code similarity is an important component of program analysis that finds application in man...
Automatic malware analysis is an essential part of today's computer security practices. Nearly one m...
International audienceObfuscation is a commonly used technique to protect software from the reverse ...
Abstract—Software obfuscation of programs, with the goal of protecting against attackers having phys...
This dissertation explores tactics for analysis and disassembly of malwares using some obfuscation t...
The purpose of this paper is to introduce a further measurement for software obfuscation, in particu...
Existing code similarity comparison methods, whether source or binary code based, are mostly not res...
Source code similarity detection has extensive applications in computer programming teaching and sof...
In this technical report, we discuss the use of code obfuscation as means of protecting the intellec...
Abstract—We present an obfuscation strategy to protect a program against injection attacks. The stra...
Obfuscation is used to protect programs from analysis and reverse engineering. There are theoretical...
Abstract—Modern obfuscation techniques are intended to dis-courage reverse engineering and malicious...
A software obfuscator is a program O to transform a source program P for protection against maliciou...
A set of algorithms of programming modules obfuscation is synthesized, which differs from the known ...
This report addresses de-obfuscation on programs. The targeted obfuscation scheme is the control flo...
Abstract Code similarity is an important component of program analysis that finds application in man...
Automatic malware analysis is an essential part of today's computer security practices. Nearly one m...
International audienceObfuscation is a commonly used technique to protect software from the reverse ...
Abstract—Software obfuscation of programs, with the goal of protecting against attackers having phys...
This dissertation explores tactics for analysis and disassembly of malwares using some obfuscation t...
The purpose of this paper is to introduce a further measurement for software obfuscation, in particu...
Existing code similarity comparison methods, whether source or binary code based, are mostly not res...
Source code similarity detection has extensive applications in computer programming teaching and sof...
In this technical report, we discuss the use of code obfuscation as means of protecting the intellec...
Abstract—We present an obfuscation strategy to protect a program against injection attacks. The stra...