ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
A Method and Implementation of Control Flow Obfuscation Using SEH
2012 Fourth International Conference on Multimedia Information Networking and Security
◽
10.1109/mines.2012.25
◽
2012
◽
Cited By ~ 2
Author(s):
Xinlei Yao
◽
Jianmin Pang
◽
Yichi Zhang
◽
Yong Yu
◽
Jianping Lu
Keyword(s):
Control Flow
◽
Control Flow Obfuscation
Download Full-text
Related Documents
Cited By
References
Software Protection Algorithm based on Control Flow Obfuscation
10.23940/ijpe.18.09.p27.21812188
◽
2018
◽
Author(s):
Yongyong Sun
Keyword(s):
Control Flow
◽
Software Protection
◽
Control Flow Obfuscation
Download Full-text
Control Flow Obfuscation Using Neural Network to Fight Concolic Testing
Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering - International Conference on Security and Privacy in Communication Networks
◽
10.1007/978-3-319-23829-6_21
◽
2015
◽
pp. 287-304
◽
Cited By ~ 1
Author(s):
Haoyu Ma
◽
Xinjie Ma
◽
Weijie Liu
◽
Zhipeng Huang
◽
Debin Gao
◽
...
Keyword(s):
Neural Network
◽
Control Flow
◽
Concolic Testing
◽
Control Flow Obfuscation
Download Full-text
Control flow obfuscation with information flow tracking
Proceedings of the 42nd Annual IEEE/ACM International Symposium on Microarchitecture - Micro-42
◽
10.1145/1669112.1669162
◽
2009
◽
Cited By ~ 18
Author(s):
Haibo Chen
◽
Liwei Yuan
◽
Xi Wu
◽
Binyu Zang
◽
Bo Huang
◽
...
Keyword(s):
Information Flow
◽
Control Flow
◽
Information Flow Tracking
◽
Control Flow Obfuscation
Download Full-text
Control flow obfuscation based protection method for Android applications
China Communications
◽
10.1109/cc.2017.8233664
◽
2017
◽
Vol 14
(11)
◽
pp. 247-259
◽
Cited By ~ 1
Author(s):
Yong Peng
◽
Guanyu Su
◽
Bin Tian
◽
Maohua Sun
◽
Qi Li
Keyword(s):
Control Flow
◽
Protection Method
◽
Android Applications
◽
Control Flow Obfuscation
Download Full-text
Embedded Software Security through Key-Based Control Flow Obfuscation
Security Aspects in Information Technology - Lecture Notes in Computer Science
◽
10.1007/978-3-642-24586-2_5
◽
2011
◽
pp. 30-44
◽
Cited By ~ 2
Author(s):
Rajat Subhra Chakraborty
◽
Seetharam Narasimhan
◽
Swarup Bhunia
Keyword(s):
Software Security
◽
Embedded Software
◽
Control Flow
◽
Control Flow Obfuscation
Download Full-text
Generalized Dynamic Opaque Predicates: A New Control Flow Obfuscation Method
Lecture Notes in Computer Science - Information Security
◽
10.1007/978-3-319-45871-7_20
◽
2016
◽
pp. 323-342
◽
Cited By ~ 10
Author(s):
Dongpeng Xu
◽
Jiang Ming
◽
Dinghao Wu
Keyword(s):
Control Flow
◽
Control Flow Obfuscation
Download Full-text
Android Control Flow Obfuscation Based on Dynamic Entry Points Modification
2019 22nd International Conference on Control Systems and Computer Science (CSCS)
◽
10.1109/cscs.2019.00054
◽
2019
◽
Author(s):
Xueyi Yang
◽
Lingchen Zhang
◽
Cunqing Ma
◽
Zongbin Liu
◽
Ping Peng
Keyword(s):
Control Flow
◽
Entry Points
◽
Control Flow Obfuscation
Download Full-text
Hardware assisted control flow obfuscation for embedded processors
Proceedings of the 2004 international conference on Compilers, architecture, and synthesis for embedded systems - CASES '04
◽
10.1145/1023833.1023873
◽
2004
◽
Cited By ~ 41
Author(s):
Xiaotong Zhuang
◽
Tao Zhang
◽
Hsien-Hsin S. Lee
◽
Santosh Pande
Keyword(s):
Control Flow
◽
Embedded Processors
◽
Control Flow Obfuscation
Download Full-text
Hidden Path: Dynamic Software Watermarking Based on Control Flow Obfuscation
22017 IEEE International Conference on Computational Science and Engineering (CSE) and IEEE International Conference on Embedded and Ubiquitous Computing (EUC)
◽
10.1109/cse-euc.2017.280
◽
2017
◽
Cited By ~ 4
Author(s):
Zhe Chen
◽
Chunfu Jia
◽
Donghui Xu
Keyword(s):
Control Flow
◽
Dynamic Software
◽
Control Flow Obfuscation
◽
Software Watermarking
Download Full-text
Semantic Redirection Obfuscation: A Control flow Obfuscation Based on Android Runtime
2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)
◽
10.1109/trustcom50675.2020.00241
◽
2020
◽
Author(s):
Zhichao Wang
◽
Yiwei Shan
◽
Zhi Yang
◽
Ruoyi Wang
◽
Shuang Song
Keyword(s):
Control Flow
◽
Control Flow Obfuscation
Download Full-text
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close