Search Results

There are 2233 results for: content related to: Server-based code obfuscation scheme for APK tamper detection

  1. Designs, analyses, and optimizations for attribute-shuffling obfuscation to protect information from malicious cloud administrators

    Security and Communication Networks

    Volume 8, Issue 17, 25 November 2015, Pages: 3045–3066, Hiroshi Fujinoki

    Article first published online : 25 MAR 2015, DOI: 10.1002/sec.1231

  2. JSOD: JavaScript obfuscation detector

    Security and Communication Networks

    Volume 8, Issue 6, April 2015, Pages: 1092–1107, Ismail Adel AL-Taharwa, Hahn-Ming Lee, Albert B. Jeng, Kuo-Ping Wu, Cheng-Seen Ho and Shyi-Ming Chen

    Article first published online : 1 JUL 2014, DOI: 10.1002/sec.1064

  3. Lattice-based obfuscation for re-encryption functions

    Security and Communication Networks

    Volume 8, Issue 9, June 2015, Pages: 1648–1658, Rong Cheng and Fangguo Zhang

    Article first published online : 19 OCT 2014, DOI: 10.1002/sec.1112

  4. Obtaining K-obfuscation for profile privacy in social networks

    Security and Communication Networks

    Volume 7, Issue 9, September 2014, Pages: 1384–1398, Xiangyu Liu, Bin Wang, Xiaochun Yang, Meng Yu and Wanyu Zang

    Article first published online : 17 JAN 2014, DOI: 10.1002/sec.871

  5. Metamorphic malware detection using base malware identification approach

    Security and Communication Networks

    Volume 7, Issue 11, November 2014, Pages: 1719–1733, Devendra Kumar Mahawer and A. Nagaraju

    Article first published online : 6 NOV 2013, DOI: 10.1002/sec.869

  6. Using HTML5 to prevent detection of drive-by-download web malware

    Security and Communication Networks

    Volume 8, Issue 7, 10 May 2015, Pages: 1237–1255, Alfredo De Santis, Giancarlo De Maio and Umberto Ferraro Petrillo

    Article first published online : 21 AUG 2014, DOI: 10.1002/sec.1077

  7. A search cost model of obfuscation

    The RAND Journal of Economics

    Volume 43, Issue 3, Fall 2012, Pages: 417–441, Glenn Ellison and Alexander Wolitzky

    Article first published online : 16 OCT 2012, DOI: 10.1111/j.1756-2171.2012.00180.x

  8. How does code obfuscation impact energy usage?

    Journal of Software: Evolution and Process

    Cagri Sahin, Mian Wan, Philip Tornquist, Ryan McKenna, Zachary Pearson, William G. J. Halfond and James Clause

    Article first published online : 6 JAN 2016, DOI: 10.1002/smr.1762

  9. A formal analysis of Trusted Platform Module 2.0 hash-based message authentication code authorization under digital rights management scenario

    Security and Communication Networks

    Fajiang Yu, Huanguo Zhang, Bo Zhao, Juan Wang, Liqiang Zhang, Fei Yan and Zhenlin Chen

    Article first published online : 23 JAN 2015, DOI: 10.1002/sec.1193

  10. Strategic Obfuscation and Consumer Protection Policy

    The Journal of Industrial Economics

    Volume 62, Issue 4, December 2014, Pages: 632–660, Yiquan Gu and Tobias Wenzel

    Article first published online : 22 DEC 2014, DOI: 10.1111/joie.12060

  11. A static Android malicious code detection method based on multi-source fusion

    Security and Communication Networks

    Volume 8, Issue 17, 25 November 2015, Pages: 3238–3246, Yao Du, Xiaoqing Wang and Junfeng Wang

    Article first published online : 30 MAR 2015, DOI: 10.1002/sec.1248

  12. Strategic obfuscation of production capacities

    Naval Research Logistics (NRL)

    Volume 61, Issue 3, April 2014, Pages: 244–267, Elizabeth J. Durango-Cohen and Liad Wagman

    Article first published online : 2 APR 2014, DOI: 10.1002/nav.21581

  13. Semantic aware attribution analysis of remote exploits

    Security and Communication Networks

    Volume 6, Issue 7, July 2013, Pages: 818–832, Deguang Kong, Donghai Tian, Qiha Pan, Peng Liu and Dinghao Wu

    Article first published online : 19 SEP 2012, DOI: 10.1002/sec.613

  14. Thwarting location privacy protection in location-based social discovery services

    Security and Communication Networks

    Minhui Xue, Yong Liu, Keith W. Ross and Haifeng Qian

    Article first published online : 4 FEB 2016, DOI: 10.1002/sec.1438

  15. BotCatch: leveraging signature and behavior for bot detection

    Security and Communication Networks

    Volume 8, Issue 6, April 2015, Pages: 952–969, Yuede Ji, Qiang Li, Yukun He and Dong Guo

    Article first published online : 3 JUL 2014, DOI: 10.1002/sec.1052

  16. Frequent sub-graph mining for intelligent malware detection

    Security and Communication Networks

    Volume 7, Issue 11, November 2014, Pages: 1872–1886, Mojtaba Eskandari and Hooman Raesi

    Article first published online : 10 JAN 2014, DOI: 10.1002/sec.902

  17. A static heuristic approach to detecting malware targets

    Security and Communication Networks

    Volume 8, Issue 17, 25 November 2015, Pages: 3015–3027, Mohaddeseh Zakeri, Fatemeh Faraji Daneshgar and Maghsoud Abbaspour

    Article first published online : 8 APR 2015, DOI: 10.1002/sec.1228

  18. Smart malware detection on Android

    Security and Communication Networks

    Volume 8, Issue 18, December 2015, Pages: 4254–4272, Laura Gheorghe, Bogdan Marin, Gary Gibson, Lucian Mogosanu, Razvan Deaconescu, Valentin-Gabriel Voiculescu and Mihai Carabas

    Article first published online : 1 SEP 2015, DOI: 10.1002/sec.1340

  19. Obfuscation for object-oriented programs: dismantling instance methods

    Software: Practice and Experience

    Volume 44, Issue 9, September 2014, Pages: 1077–1104, Heh-Tyan Liaw and Shih-Chieh Wei

    Article first published online : 4 APR 2013, DOI: 10.1002/spe.2193

  20. Secure and transparent network traffic replay, redirect, and relay in a dynamic malware analysis environment

    Security and Communication Networks

    Volume 7, Issue 3, March 2014, Pages: 626–640, Ying-Dar Lin, Tzung-Bi Shih, Yu-Sung Wu and Yuan-Cheng Lai

    Article first published online : 21 MAR 2013, DOI: 10.1002/sec.764