Articles with "trace obfuscation" as a keyword



Photo by dawson2406 from unsplash

Model of Execution Trace Obfuscation Between Threads

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Transactions on Dependable and Secure Computing"

DOI: 10.1109/tdsc.2021.3123159

Abstract: Advanced reverse analysis tools have significantly improved the ability of attackers to crack software via dynamic analysis techniques, such as symbol execution and taint analysis. These techniques are widely used in malicious fields such as… read more here.

Keywords: execution trace; trace obfuscation; analysis; obfuscation ... See more keywords