Articles with "hybrid obfuscation" as a keyword



Photo by thisisengineering from unsplash

Hybrid Obfuscation Technique to Protect Source Code From Prohibited Software Reverse Engineering

Sign Up to like & get
recommendations!
Published in 2020 at "IEEE Access"

DOI: 10.1109/access.2020.3028428

Abstract: In this research, a new Hybrid Obfuscation Technique was proposed to prevent prohibited Reverse Engineering. The proposed hybrid technique contains three approaches; first approach is string encryption. The string encryption is about adding a mathematical… read more here.

Keywords: obfuscation technique; reverse engineering; hybrid obfuscation; code ... See more keywords
Photo from wikipedia

Hybrid Obfuscation to Protect Against Disclosure Attacks on Embedded Microprocessors

Sign Up to like & get
recommendations!
Published in 2018 at "IEEE Transactions on Computers"

DOI: 10.1109/tc.2017.2649520

Abstract: The risk of code reverse-engineering is particularly acute for embedded processors which often have limited available resources to protect program information. Previous efforts involving code obfuscation provide some additional security against reverse- engineering of programs,… read more here.

Keywords: hybrid obfuscation; obfuscation protect; protect disclosure; disclosure attacks ... See more keywords