2016 World Conference on Futuristic Trends in Research and Innovation for Social Welfare (Startup Conclave) 2016
DOI: 10.1109/startup.2016.7583913
|View full text |Cite
|
Sign up to set email alerts
|

A study & review on code obfuscation

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
4
4
1

Relationship

0
9

Authors

Journals

citations
Cited by 20 publications
(4 citation statements)
references
References 10 publications
0
4
0
Order By: Relevance
“…The chaotic equations are deterministic by nature, which means that they go into saturation after several iterations at a single value. Figure 2 presents sample of string after applying chaotic obfuscation [8].…”
Section: Chaotic Obfuscationmentioning
confidence: 99%
“…The chaotic equations are deterministic by nature, which means that they go into saturation after several iterations at a single value. Figure 2 presents sample of string after applying chaotic obfuscation [8].…”
Section: Chaotic Obfuscationmentioning
confidence: 99%
“…In recent years, there has been much research on code obfuscation techniques (Ebad et al, 2021;Hosseinzadeh et al, 2018). The proposed methods use layout transformation (Collberg et al, 1997;Sebastian et al, 2016), data transformation and control transformation or a combination of these techniques. Authors of various algorithms use differently defined attributes to measure the quality of obfuscation.…”
Section: Related Workmentioning
confidence: 99%
“…b. The reordering process will randomize the order of expressions, statements, and loops while keeping the basic blocks integrated [16].…”
Section: Control Flow Transformationmentioning
confidence: 99%