A set of algorithms of programming modules obfuscation is synthesized, which differs from the known ones by taking into account the variability of data types. This made it possible to describe these processes at the upper strategic level of formalization. The possibilities of using GERT models to apply various options of the distribution laws and their parameters in the transition from state to state are investigated. A unified GERT model of the programming modules obfuscation process is developed. This model differs from the known ones by the paradigm of using the mathematical apparatus of gamma distribution as the key one at all stages of modeling the obfuscation process. This made it possible to achieve model unification in the condition...
Previously software is distributed to the users by using devices like CD.S and floppies and in the ...
Abstract—Modern obfuscation techniques are intended to dis-courage reverse engineering and malicious...
With the advancement of reverse engineering technology, the rise in software piracy and program hack...
Obfuscation is used to protect programs from analysis and reverse engineering. There are theoretical...
A method is developed for assessing the practical persistence of obfuscating transformations of prog...
Software, over the years, has evolved from free code given along with the hardware for free to a val...
This paper has determined the relevance of the issue related to improving the accuracy of the result...
In this technical report, we discuss the use of code obfuscation as means of protecting the intellec...
Software obfuscation is widely applied to prevent reverse engineering of applications. However, to e...
This paper reports an analysis of the software (SW) safety testing techniques, as well as the models...
This paper reports an analysis of the software (SW) safety testing techniques, as well as the models...
International audienceCode obfuscation is the de facto standard to protect intellectual property whe...
Code protection technologies require anti reverse engineering transformations to obfuscate programs ...
Objectives. At present, conducting a computational experiment on a system for protecting information...
International audienceObfuscation is a commonly used technique to protect software from the reverse ...
Previously software is distributed to the users by using devices like CD.S and floppies and in the ...
Abstract—Modern obfuscation techniques are intended to dis-courage reverse engineering and malicious...
With the advancement of reverse engineering technology, the rise in software piracy and program hack...
Obfuscation is used to protect programs from analysis and reverse engineering. There are theoretical...
A method is developed for assessing the practical persistence of obfuscating transformations of prog...
Software, over the years, has evolved from free code given along with the hardware for free to a val...
This paper has determined the relevance of the issue related to improving the accuracy of the result...
In this technical report, we discuss the use of code obfuscation as means of protecting the intellec...
Software obfuscation is widely applied to prevent reverse engineering of applications. However, to e...
This paper reports an analysis of the software (SW) safety testing techniques, as well as the models...
This paper reports an analysis of the software (SW) safety testing techniques, as well as the models...
International audienceCode obfuscation is the de facto standard to protect intellectual property whe...
Code protection technologies require anti reverse engineering transformations to obfuscate programs ...
Objectives. At present, conducting a computational experiment on a system for protecting information...
International audienceObfuscation is a commonly used technique to protect software from the reverse ...
Previously software is distributed to the users by using devices like CD.S and floppies and in the ...
Abstract—Modern obfuscation techniques are intended to dis-courage reverse engineering and malicious...
With the advancement of reverse engineering technology, the rise in software piracy and program hack...