Articles with "obfuscation technique" as a keyword



Photo by thisisengineering from unsplash

Hybrid Obfuscation Technique to Protect Source Code From Prohibited Software Reverse Engineering

Sign Up to like & get
recommendations!
Published in 2020 at "IEEE Access"

DOI: 10.1109/access.2020.3028428

Abstract: In this research, a new Hybrid Obfuscation Technique was proposed to prevent prohibited Reverse Engineering. The proposed hybrid technique contains three approaches; first approach is string encryption. The string encryption is about adding a mathematical… read more here.

Keywords: obfuscation technique; reverse engineering; hybrid obfuscation; code ... See more keywords