Articles with "obfuscation techniques" as a keyword



Photo by dawson2406 from unsplash

Security Analysis of Scan Obfuscation Techniques

Sign Up to like & get
recommendations!
Published in 2023 at "IEEE Transactions on Information Forensics and Security"

DOI: 10.1109/tifs.2023.3265815

Abstract: Scan is the de-facto standard for testing, which provides high observability and test coverage by enabling direct access to chip memory elements. The scan-based Design-for-Testability (DfT) technique has also become the prime target of attackers… read more here.

Keywords: obfuscation; scan obfuscation; security analysis; obfuscation techniques ... See more keywords
Photo by masakaze from unsplash

On the evaluation of android malware detectors against code-obfuscation techniques

Sign Up to like & get
recommendations!
Published in 2022 at "PeerJ Computer Science"

DOI: 10.7717/peerj-cs.1002

Abstract: The Android mobile platform is the most popular and dominates the cell phone market. With the increasing use of Android, malware developers have become active in circumventing security measures by using various obfuscation techniques. The… read more here.

Keywords: anti malware; obfuscation; android malware; detection ... See more keywords