Essays about: "Code Obfuscation"
Showing result 1 - 5 of 11 essays containing the words Code Obfuscation.
-
1. Protecting software in embedded IoT units : The impact of code obfuscation
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Embedded Internet of Things (IoT) products are taking up a larger part of the market thanks to smaller, cheaper and more advanced components. For companies that spend time and resources on developing software for these products, it is important to keep that software secure to maintain the advantage gained. READ MORE
-
2. Breaking WebAssembly Crypto Miner Detection by Obfuscation
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Blockchain-based cryptocurrencies is a fairly new concept with a worldwide spread, and there is a massive amount of currencies. Several of them involve so-called currency mining, a feature of Proof-of-Work based blockchains. READ MORE
-
3. Supply chain attacks in open source projects
University essay from Lunds universitet/Institutionen för elektro- och informationsteknikAbstract : The space of open source supply chain attacks is ever evolving and growing. There is extensive previous work identifying and collecting open source supply chain attacks, as well as identifying patterns in these attacks and proving that machine learning models may be able to detect these patterns. READ MORE
-
4. Increased evasion resilience in modern PDF malware detectors : Using a more evasive training dataset
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : The large scale usage of the PDF coupled with its versatility has made the format an attractive target for carrying and deploying malware. Traditional antivirus software struggles against new malware and PDF's vast obfuscation options. In the search of better detection systems, machine learning based detectors have been developed. READ MORE
-
5. Is it possible to reverse engineer obfuscated bytecode back to source code?
University essay from KTH/Hälsoinformatik och logistikAbstract : AbstractThere are a lot of old software in the world that has not been supported or kept up todate and would need to be updated to seal security vulnerabilities, as well as to updatefunctions in the program. In those cases where the source code has been lost ordeliberately deleted, would it be possible to use reverse engineering to retrieve thesource code?This study aims to show what java bytecode is and how it is used, as well as how oneis able to go from java bytecode back to source code in a process called Reverse Engineering. READ MORE