Essays about: "Kodobfuskering"

Found 5 essays containing the word Kodobfuskering.

  1. 1. Protecting software in embedded IoT units : The impact of code obfuscation

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Fredrik Karlsson; [2023]
    Keywords : Embedded; Obfuscation; Software protection; Internet of Things; Inbyggd; Obfuskering; Mjukvaruskydd; Internet of Things;

    Abstract : Embedded Internet of Things (IoT) products are taking up a larger part of the market thanks to smaller, cheaper and more advanced components. For companies that spend time and resources on developing software for these products, it is important to keep that software secure to maintain the advantage gained. READ MORE

  2. 2. Breaking WebAssembly Crypto Miner Detection by Obfuscation

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Gustav Ekner; [2023]
    Keywords : Computer Security; WebAssembly; Crypto mining; Code Obfuscation; Browsers; Datasäkerhet; WebAssembly; Kryptovalutautvinning; Kodobfuskering; Webbläsare;

    Abstract : Blockchain-based cryptocurrencies is a fairly new concept with a worldwide spread, and there is a massive amount of currencies. Several of them involve so-called currency mining, a feature of Proof-of-Work based blockchains. READ MORE

  3. 3. Platform Independent Code Obfuscation

    University essay from KTH/Skolan för datavetenskap och kommunikation (CSC)

    Author : OSKAR ARVIDSSON; [2014]
    Keywords : ;

    Abstract : Code obfuscation is a technique used to make soft- ware more difficult to read and reverse engineer. It is used in the industry to protect proprietary algo- rithms and to protect the software from unintended use. The current state of the art solutions in the in- dustry depend on specific platform targets. READ MORE

  4. 4. Obfuscate Java bytecode: an evaluation ofobfuscating transformations using JBCO

    University essay from KTH/Skolan för datavetenskap och kommunikation (CSC)

    Author : EMILIA HILLERT; [2014]
    Keywords : ;

    Abstract : Today, software is one of the most complex and intriguing technologies around us. Software development companies must be able to protect their products in order to stay strong against its competitors and against other threats. One solution to this problem is code obfuscation. READ MORE

  5. 5. Implementation and evaluation of some platformindependent obfuscating transformations

    University essay from KTH/Skolan för datavetenskap och kommunikation (CSC)

    Author : OSKAR WERKELIN AHLIN; [2013]
    Keywords : ;

    Abstract : We study the state-of-art of code obfuscation, a technique used to protect software from reverse engineering by complicating the execution flow of a program. The best current solutions are platform dependent. READ MORE