Essays about: "Code Obfuscation"

Showing result 1 - 5 of 11 essays containing the words Code Obfuscation.

  1. 1. Protecting software in embedded IoT units : The impact of code obfuscation

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Fredrik Karlsson; [2023]
    Keywords : Embedded; Obfuscation; Software protection; Internet of Things; Inbyggd; Obfuskering; Mjukvaruskydd; Internet of Things;

    Abstract : Embedded Internet of Things (IoT) products are taking up a larger part of the market thanks to smaller, cheaper and more advanced components. For companies that spend time and resources on developing software for these products, it is important to keep that software secure to maintain the advantage gained. READ MORE

  2. 2. Breaking WebAssembly Crypto Miner Detection by Obfuscation

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Gustav Ekner; [2023]
    Keywords : Computer Security; WebAssembly; Crypto mining; Code Obfuscation; Browsers; Datasäkerhet; WebAssembly; Kryptovalutautvinning; Kodobfuskering; Webbläsare;

    Abstract : Blockchain-based cryptocurrencies is a fairly new concept with a worldwide spread, and there is a massive amount of currencies. Several of them involve so-called currency mining, a feature of Proof-of-Work based blockchains. READ MORE

  3. 3. Supply chain attacks in open source projects

    University essay from Lunds universitet/Institutionen för elektro- och informationsteknik

    Author : Oliver Stussi; David Uhler Brand; [2022]
    Keywords : Technology and Engineering;

    Abstract : The space of open source supply chain attacks is ever evolving and growing. There is extensive previous work identifying and collecting open source supply chain attacks, as well as identifying patterns in these attacks and proving that machine learning models may be able to detect these patterns. READ MORE

  4. 4. Increased evasion resilience in modern PDF malware detectors : Using a more evasive training dataset

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Oscar Ekholm; [2022]
    Keywords : Malware Analysis; Malicious PDF; Malware Detection; Machine Learning; Evasion; Analys av skadlig programvara; Skadlig PDF; Detektion av skadlig programvara; Maskininlärning; Undanflykt;

    Abstract : The large scale usage of the PDF coupled with its versatility has made the format an attractive target for carrying and deploying malware. Traditional antivirus software struggles against new malware and PDF's vast obfuscation options. In the search of better detection systems, machine learning based detectors have been developed. READ MORE

  5. 5. Is it possible to reverse engineer obfuscated bytecode back to source code?

    University essay from KTH/Hälsoinformatik och logistik

    Author : Gustav Smedberg; Jenny Malmgren; [2020]
    Keywords : ;

    Abstract : AbstractThere are a lot of old software in the world that has not been supported or kept up todate and would need to be updated to seal security vulnerabilities, as well as to updatefunctions in the program. In those cases where the source code has been lost ordeliberately deleted, would it be possible to use reverse engineering to retrieve thesource code?This study aims to show what java bytecode is and how it is used, as well as how oneis able to go from java bytecode back to source code in a process called Reverse Engineering. READ MORE