DynOpVm: VM-based software obfuscation with dynamic opcode mapping
VM-based software obfuscation has emerged as an effective technique for program obfuscation. Despite various attempts in improving its effectiveness and security, existing VM-based software obfuscators use potentially multiple but static secret mappings between virtual and native opcodes to hide the...
Saved in:
Main Authors: | CHENG, Xiaoyang, LIN, Yan, GAO, Debin |
---|---|
Format: | text |
Language: | English |
Published: |
Institutional Knowledge at Singapore Management University
2019
|
Subjects: | |
Online Access: | https://ink.library.smu.edu.sg/sis_research/4687 https://ink.library.smu.edu.sg/context/sis_research/article/5690/viewcontent/DynOpVm_acns19_av.pdf |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Singapore Management University |
Language: | English |
Similar Items
-
Integrated software fingerprinting via neural-network-based control flow obfuscation
by: MA, Haoyu, et al.
Published: (2016) -
Linear Obfuscation to Combat Symbolic Execution
by: WANG, Zhi, et al.
Published: (2011) -
How to resuscitate a sick VM in the cloud
by: DING, Xuhua
Published: (2023) -
TAD : time side-channel attack defense of obfuscated source code
by: Fell, Alexander, et al.
Published: (2021) -
On the effectiveness of code-reuse-based Android application obfuscation
by: TANG, Xiaoxiao, et al.
Published: (2017)