To search, Click below search items.
All Published Papers Search Service
Title
Optimal Values for Disrupting x86-64 Reverse Assemblers
Author
Sara Shinn, William Mahoney
Vol. 11 No. 11 pp. 104-109
Keywords
Reverse engineering, intel x86, assembly language, obfuscation
Camouflage in Malware: from Encryption to Metamorphism
Babak Bashari Rad, Maslin Masrom, Suhaimi Ibrahim
Vol. 12 No. 8 pp. 74-83
Camouflage in Malware, Malware Evolution, Malware Encryption, Malware Oligomorphism, Malware Polymorphism, Malware Metamorphism, Obfuscation Techniques
Overcoming Trial Version Software Cracking Using a Hybridized Self-Modifying Technique
C. K. Oputeh, E. E. Ogheneovo
Vol. 15 No. 4 pp. 75-84
Software cracking, reverse engineering, code obfuscation, self-modification, encryption.
Obfuscation with Fuzzy Based Data Security Algorithm for Improving the Security in Cloud (OFDSA)
A.Ahadha Parveen and P.S.S Akilashri
Vol. 22 No. 11 pp. 485-492
Obfuscation; AES; Encryption; Fuzzy Logic.