Skip Content
You are currently on the new version of our website. Access the old version .

50 Results Found

  • Article
  • Open Access
4 Citations
6,424 Views
20 Pages

A Framework to Quantify the Quality of Source Code Obfuscation

  • Hongjoo Jin,
  • Jiwon Lee,
  • Sumin Yang,
  • Kijoong Kim and
  • Dong Hoon Lee

10 June 2024

Malicious reverse engineering of software has served as a valuable technique for attackers to infringe upon and steal intellectual property. We can employ obfuscation techniques to protect against such attackers as useful tools to safeguard software....

  • Article
  • Open Access
2 Citations
4,358 Views
20 Pages

Code Obfuscation: A Comprehensive Approach to Detection, Classification, and Ethical Challenges

  • Tomer Raitsis,
  • Yossi Elgazari,
  • Guy E. Toibin,
  • Yotam Lurie,
  • Shlomo Mark and
  • Oded Margalit

21 January 2025

Code obfuscation has become an essential practice in modern software development, designed to make source or machine code challenging for both humans and computers to comprehend. It plays a crucial role in cybersecurity by protecting intellectual pro...

  • Article
  • Open Access
1 Citations
2,323 Views
16 Pages

27 December 2023

As the most widely used description code in digital circuits and system on chip (SoC), the security of register transfer level (RTL) code is extremely critical. Code obfuscation is a typical method to ensure the security of RTL code, but popular obfu...

  • Article
  • Open Access
1,417 Views
29 Pages

Classification of Obfuscation Techniques in LLVM IR: Machine Learning on Vector Representations

  • Sebastian Raubitzek,
  • Patrick Felbauer,
  • Kevin Mallinger and
  • Sebastian Schrittwieser

We present a novel methodology for classifying code obfuscation techniques in LLVM IR program embeddings. We apply isolated and layered code obfuscations to C source code using the Tigress obfuscator, compile them to LLVM IR, and convert each IR code...

  • Article
  • Open Access
6 Citations
2,685 Views
15 Pages

26 August 2024

With the increasing use of sophisticated obfuscation techniques, malware detection remains a critical challenge in cybersecurity. This paper introduces a novel deep learning approach to classify malware obfuscated by virtual machine (VM) code. We spe...

  • Article
  • Open Access
5,263 Views
21 Pages

27 January 2024

Despite recent remarkable advances in binary code analysis, malware developers still use complex anti-reversing techniques that make analysis difficult. Packers are used to protect malware, which are (commercial) tools that contain diverse anti-rever...

  • Article
  • Open Access
33 Citations
7,687 Views
15 Pages

Detection of Obfuscated Malicious JavaScript Code

  • Ammar Alazab,
  • Ansam Khraisat,
  • Moutaz Alazab and
  • Sarabjot Singh

Websites on the Internet are becoming increasingly vulnerable to malicious JavaScript code because of its strong impact and dramatic effect. Numerous recent cyberattacks use JavaScript vulnerabilities, and in some cases employ obfuscation to conceal...

  • Article
  • Open Access
5 Citations
6,564 Views
23 Pages

VMGuards: A Novel Virtual Machine Based Code Protection System with VM Security as the First Class Design Concern

  • Zhanyong Tang,
  • Meng Li,
  • Guixin Ye,
  • Shuai Cao,
  • Meiling Chen,
  • Xiaoqing Gong,
  • Dingyi Fang and
  • Zheng Wang

12 May 2018

Process-level virtual machine (PVM) based code obfuscation is a viable means for protecting software against runtime code tampering and unauthorized code reverse engineering. PVM-based approaches rely on a VM to determine how instructions of the prot...

  • Article
  • Open Access
312 Views
25 Pages

18 January 2026

Technical job interviews have become a vulnerable environment for social engineering attacks, particularly when they involve direct interaction with malicious code. In this context, the present manuscript investigates an exploratory case study, aimin...

  • Review
  • Open Access
29 Citations
10,463 Views
38 Pages

A Survey and Evaluation of Android-Based Malware Evasion Techniques and Detection Frameworks

  • Parvez Faruki,
  • Rati Bhan,
  • Vinesh Jain,
  • Sajal Bhatia,
  • Nour El Madhoun and
  • Rajendra Pamula

30 June 2023

Android platform security is an active area of research where malware detection techniques continuously evolve to identify novel malware and improve the timely and accurate detection of existing malware. Adversaries are constantly in charge of employ...

  • Article
  • Open Access
8 Citations
2,751 Views
22 Pages

Task-Aware Meta Learning-Based Siamese Neural Network for Classifying Control Flow Obfuscated Malware

  • Jinting Zhu,
  • Julian Jang-Jaccard,
  • Amardeep Singh,
  • Paul A. Watters and
  • Seyit Camtepe

Malware authors apply different techniques of control flow obfuscation, in order to create new malware variants to avoid detection. Existing Siamese neural network (SNN)-based malware detection methods fail to correctly classify different malware fam...

  • Article
  • Open Access
2 Citations
2,735 Views
13 Pages

DFSGraph: Data Flow Semantic Model for Intermediate Representation Programs Based on Graph Network

  • Ke Tang,
  • Zheng Shan,
  • Chunyan Zhang,
  • Lianqiu Xu,
  • Meng Qiao and
  • Fudong Liu

8 October 2022

With the improvement of software copyright protection awareness, code obfuscation technology plays a crucial role in protecting key code segments. As the obfuscation technology becomes more and more complex and diverse, it has spawned a large number...

  • Article
  • Open Access
3 Citations
3,043 Views
21 Pages

APIASO: A Novel API Call Obfuscation Technique Based on Address Space Obscurity

  • Yang Li,
  • Fei Kang,
  • Hui Shu,
  • Xiaobing Xiong,
  • Yuntian Zhao and
  • Rongbo Sun

8 August 2023

API calls are programming interfaces used by applications. When it is difficult for an analyst to perform a direct reverse analysis of a program, the API provides an important basis for analyzing the behavior and functionality of the program. API add...

  • Article
  • Open Access
3 Citations
3,897 Views
19 Pages

Pinicorn: Towards Automated Dynamic Analysis for Unpacking 32-Bit PE Malware

  • Gwangyeol Lee,
  • Minho Kim,
  • Jeong Hyun Yi and
  • Haehyun Cho

Original Entry Point (OEP) and API obfuscation techniques greatly hinder the analysis of malware. Contemporary packers, employing these sophisticated obfuscation strategies, continue to pose unresolved challenges, despite extensive research efforts....

  • Article
  • Open Access
3 Citations
2,368 Views
15 Pages

7 November 2023

Quantum obfuscation is one of the important primitives in quantum cryptography that can be used to enhance the security of various quantum cryptographic schemes. The research on quantum obfuscation focuses mainly on the obfuscatability of quantum fun...

  • Article
  • Open Access
3 Citations
3,261 Views
16 Pages

Zero-Error Coding via Classical and Quantum Channels in Sensor Networks

  • Wenbin Yu,
  • Zijia Xiong,
  • Zanqiang Dong,
  • Siyao Wang,
  • Jingya Li,
  • Gaoping Liu and
  • Alex X. Liu

20 November 2019

Today’s sensor networks need robustness, security and efficiency with a high level of assurance. Error correction is an effective communicational technique that plays a critical role in maintaining robustness in informational transmission. The...

  • Review
  • Open Access
1 Citations
4,535 Views
67 Pages

Hardware and Software Methods for Secure Obfuscation and Deobfuscation: An In-Depth Analysis

  • Khaled Saleh,
  • Dirar Darweesh,
  • Omar Darwish,
  • Eman Hammad and
  • Fathi Amsaad

The swift evolution of information technology and growing connectivity in critical applications have elevated cybersecurity, protecting and certifying software and designs against rising cyber threats. For example, software and hardware have become h...

  • Article
  • Open Access
5 Citations
7,903 Views
15 Pages

An Android Malicious Code Detection Method Based on Improved DCA Algorithm

  • Chundong Wang,
  • Zhiyuan Li,
  • Liangyi Gong,
  • Xiuliang Mo,
  • Hong Yang and
  • Yi Zhao

11 February 2017

Recently, Android malicious code has increased dramatically and the technology of reinforcement is increasingly powerful. Due to the development of code obfuscation and polymorphic deformation technology, the current Android malicious code static det...

  • Article
  • Open Access
10 Citations
3,858 Views
14 Pages

28 October 2020

Malware detection and classification methods are being actively developed to protect personal information from hackers. Global images of malware (in a program that includes personal information) can be utilized to detect or classify it. This method i...

  • Article
  • Open Access
11 Citations
6,348 Views
13 Pages

14 August 2018

In the malware detection process, obfuscated malicious codes cannot be efficiently and accurately detected solely in the dynamic or static feature space. Aiming at this problem, an integrative feature extraction algorithm based on simhash was propose...

  • Article
  • Open Access
11 Citations
7,267 Views
18 Pages

20 January 2022

The detection and classification of threats in computer systems has been one of the main problems researched in Cybersecurity. As technology evolves, the tactics employed by adversaries have also become more sophisticated to evade detection systems....

  • Review
  • Open Access
1 Citations
2,852 Views
15 Pages

Researchers have proposed different obfuscation transformations supported by numerous smartphone protection tools (obfuscators and deobfuscators). However, there is a need for a comprehensive study to empirically characterize these tools that belong...

  • Article
  • Open Access
8 Citations
4,056 Views
15 Pages

28 December 2022

Third-party library (TPL) reuse may introduce vulnerable or malicious code and expose the software, which exposes them to potential risks. Thus, it is essential to identify third-party dependencies and take immediate corrective action to fix critical...

  • Article
  • Open Access
59 Citations
6,288 Views
15 Pages

Cross-Method-Based Analysis and Classification of Malicious Behavior by API Calls Extraction

  • Bruce Ndibanje,
  • Ki Hwan Kim,
  • Young Jin Kang,
  • Hyun Ho Kim,
  • Tae Yong Kim and
  • Hoon Jae Lee

10 January 2019

Data-driven public security networking and computer systems are always under threat from malicious codes known as malware; therefore, a large amount of research and development is taking place to find effective countermeasures. These countermeasures...

  • Article
  • Open Access
2 Citations
5,100 Views
22 Pages

15 January 2025

In this study, we propose a method for successfully evading antivirus detection by encoding malicious shellcode with fountain codes. The Meterpreter framework for Microsoft Windows 32-bit and 64-bit architectures was used to produce the shellcode use...

  • Article
  • Open Access
23 Citations
6,632 Views
17 Pages

Source Code Authorship Identification Using Deep Neural Networks

  • Anna Kurtukova,
  • Aleksandr Romanov and
  • Alexander Shelupanov

10 December 2020

Many open-source projects are developed by the community and have a common basis. The more source code is open, the more the project is open to contributors. The possibility of accidental or deliberate use of someone else’s source code as a clo...

  • Article
  • Open Access
1,108 Views
20 Pages

31 August 2025

This paper investigates federated learning (FL) for cross-site scripting (XSS) detection under out-of-distribution (OOD) drift. Real-world XSS traffic involves fragmented attacks, heterogeneous benign inputs, and client imbalance, which erode convent...

  • Article
  • Open Access
6 Citations
2,912 Views
23 Pages

Methods to Encrypt and Authenticate Digital Files in Distributed Networks and Zero-Trust Environments

  • Bertrand Cambou,
  • Christopher Philabaum,
  • Jeffrey Hoffstein and
  • Maurice Herlihy

29 May 2023

The methods proposed in this paper are leveraging Challenge–Response–Pair (CRP) mechanisms that are directly using each digital file as a source of randomness. Two use cases are considered: the protection and verification of authenticity...

  • Article
  • Open Access
6 Citations
3,843 Views
20 Pages

Detecting Web-Based Attacks with SHAP and Tree Ensemble Machine Learning Methods

  • Samuel Ndichu,
  • Sangwook Kim,
  • Seiichi Ozawa,
  • Tao Ban,
  • Takeshi Takahashi and
  • Daisuke Inoue

22 December 2021

Attacks using Uniform Resource Locators (URLs) and their JavaScript (JS) code content to perpetrate malicious activities on the Internet are rampant and continuously evolving. Methods such as blocklisting, client honeypots, domain reputation inspecti...

  • Article
  • Open Access
2 Citations
5,563 Views
24 Pages

14 November 2024

This study employed chaotic systems as an innovative approach for shellcode obfuscation to evade current antivirus detection methods. Standard AV solutions primarily rely on static signatures and heuristic analysis to identify malicious code. However...

  • Article
  • Open Access
3 Citations
2,349 Views
20 Pages

Algebraic Structures Induced by the Insertion and Detection of Malware

  • Agustín Moreno Cañadas,
  • Odette M. Mendez and
  • Juan David Camacho Vega

Since its introduction, researching malware has had two main goals. On the one hand, malware writers have been focused on developing software that can cause more damage to a targeted host for as long as possible. On the other hand, malware analysts h...

  • Article
  • Open Access
5 Citations
2,543 Views
19 Pages

Cryptographic Algorithms with Data Shorter than the Encryption Key, Based on LZW and Huffman Coding

  • Tomasz Krokosz,
  • Jarogniew Rykowski,
  • Małgorzata Zajęcka,
  • Robert Brzoza-Woch and
  • Leszek Rutkowski

25 August 2023

Modern, commonly used cryptosystems based on encryption keys require that the length of the stream of encrypted data is approximately the length of the key or longer. In practice, this approach unnecessarily complicates strong encryption of very shor...

  • Article
  • Open Access
60 Citations
8,171 Views
21 Pages

MALGRA: Machine Learning and N-Gram Malware Feature Extraction and Detection System

  • Muhammad Ali,
  • Stavros Shiaeles,
  • Gueltoum Bendiab and
  • Bogdan Ghita

26 October 2020

Detection and mitigation of modern malware are critical for the normal operation of an organisation. Traditional defence mechanisms are becoming increasingly ineffective due to the techniques used by attackers such as code obfuscation, metamorphism,...

  • Article
  • Open Access
33 Citations
10,067 Views
16 Pages

Mitigating Webshell Attacks through Machine Learning Techniques

  • You Guo,
  • Hector Marco-Gisbert and
  • Paul Keir

14 January 2020

A webshell is a command execution environment in the form of web pages. It is often used by attackers as a backdoor tool for web server operations. Accurately detecting webshells is of great significance to web server protection. Most security produc...

  • Article
  • Open Access
8 Citations
10,619 Views
22 Pages

MinerGuard: A Solution to Detect Browser-Based Cryptocurrency Mining through Machine Learning

  • Min-Hao Wu,
  • Yen-Jung Lai,
  • Yan-Ling Hwang,
  • Ting-Cheng Chang and
  • Fu-Hau Hsu

29 September 2022

Coinhive released its browser-based cryptocurrency mining code in September 2017, and vicious web page writers, called vicious miners hereafter, began to embed mining JavaScript code into their web pages, called mining pages hereafter. As a result, b...

  • Article
  • Open Access
5 Citations
2,275 Views
19 Pages

In the context of escalating network adversarial challenges, effectively identifying a Webshell processed using evasion techniques such as encoding, obfuscation, and nesting remains a critical challenge in the field of cybersecurity. To address the p...

  • Article
  • Open Access
901 Views
34 Pages

11 November 2025

This study introduces an energy-aware hybrid security framework that safeguards embedded systems against code theft, closing a critical gap. The approach integrates bitstream encryption, dynamic key generation, and Dynamic Function eXchange (DFX)-bas...

  • Article
  • Open Access
17 Citations
6,604 Views
23 Pages

26 June 2018

Malware have been tremendously growing in recent years. Most malware use obfuscation techniques for evasion and hiding purposes, but they preserve the functionality and malicious behavior of original code. Although most research work has been mainly...

  • Article
  • Open Access
3 Citations
2,493 Views
30 Pages

14 September 2024

With the increasing popularity of Android smartphones, malware targeting the Android platform is showing explosive growth. Currently, mainstream detection methods use static analysis methods to extract features of the software and apply machine learn...

  • Article
  • Open Access
73 Citations
4,852 Views
18 Pages

3 February 2023

Aiming at the problems of small key space and weak resistance to differential attacks in existing encryption algorithms, we proposed a chaotic digital image encryption scheme based on an optimized artificial fish swarm algorithm and DNA coding. First...

  • Article
  • Open Access
1,863 Views
20 Pages

JITScanner: Just-in-Time Executable Page Check in the Linux Operating System

  • Pasquale Caporaso,
  • Giuseppe Bianchi and
  • Francesco Quaglia

26 February 2024

Modern malware poses a severe threat to cybersecurity, continually evolving in sophistication. To combat this threat, researchers and security professionals continuously explore advanced techniques for malware detection and analysis. Dynamic analysis...

  • Article
  • Open Access
18 Citations
5,508 Views
19 Pages

22 March 2023

In previous years, cybercriminals have utilized various strategies to evade identification, including obfuscation, confusion, and polymorphism technology, resulting in an exponential increase in the amount of malware that poses a serious threat to co...

  • Article
  • Open Access
401 Views
19 Pages

POS: A Recognition Method for Packed Software in Opened-Set Scenario

  • Zhenghao Qian,
  • Fengzheng Liu,
  • Mingdong He,
  • Bo Li,
  • Xuewu Li,
  • Chuangye Zhao,
  • Gehua Fu,
  • Yifan Hu and
  • Hao Liu

14 November 2025

Malware plays a critical role in network attacks, making its analysis essential for ensuring network security. To evade detection, malware developers often use packing techniques to hide malicious code, making it difficult for analysts to identify th...

  • Article
  • Open Access
17 Citations
5,403 Views
23 Pages

19 November 2021

Android ransomware is one of the most threatening attacks that is increasing at an alarming rate. Ransomware attacks usually target Android users by either locking their devices or encrypting their data files and then requesting them to pay money to...

  • Article
  • Open Access
3 Citations
2,936 Views
19 Pages

9 December 2022

In recent years, the presence of malware has been growing exponentially, resulting in enormous demand for efficient malware classification methods. However, the existing machine learning-based classifiers have high false positive rates and cannot eff...

  • Feature Paper
  • Article
  • Open Access
911 Views
21 Pages

13 August 2025

Reversible data hiding in encrypted point clouds presents unique challenges due to their unstructured geometry, absence of mesh connectivity, and high sensitivity to spatial perturbations. In this paper, we propose an efficient and secure reversible...

  • Article
  • Open Access
757 Views
23 Pages

Hardware Validation for Semi-Coherent Transmission Security

  • Michael Fletcher,
  • Jason McGinthy and
  • Alan J. Michaels

5 September 2025

The rapid growth of Internet-connected devices integrating into our everyday lives has no end in sight. As more devices and sensor networks are manufactured, security tends to be a low priority. However, the security of these devices is critical, and...

  • Article
  • Open Access
314 Views
19 Pages

Heuristics Analyses of Smart Contracts Bytecodes and Their Classifications

  • Chibuzor Udokwu,
  • Seyed Amid Moeinzadeh Mirhosseini and
  • Stefan Craß

Smart contracts are deployed and represented as bytecodes in blockchain networks, and these bytecodes are machine-readable codes. Only a small number of deployed smart contracts have their verified human-readable code publicly accessible to blockchai...

  • Article
  • Open Access
332 Views
24 Pages

Cross-site scripting (XSS) attacks are among the threats facing web security, resulting from the diversity and complexity of HTML formats. Research has shown that some text processing-based methods are limited in their ability to detect this type of...