Hybrid obfuscation technique to protect source code from prohibited software reverse engineering
In this research, a new Hybrid Obfuscation Technique was proposed to prevent prohibited Reverse Engineering. The proposed hybrid technique contains three approaches; first approach is string encryption. The string encryption is about adding a mathematical equation with arrays and loops to the strin...
| Main Authors: | Al-Hakimi, Asma'a Mahfoud Hezam, Md Sultan, Abu Bakar, Abdul Ghani, Abdul Azim, Mohd Ali, Norhayati, Admodisastro, Novia Indriaty |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
Institute of Electrical and Electronics Engineers
2020
|
| Online Access: | http://psasir.upm.edu.my/id/eprint/89227/ http://psasir.upm.edu.my/id/eprint/89227/1/OBF.pdf |
Similar Items
Enhancing obfuscation technique for protecting source code against software reverse engineering
by: Mahfoudh, Asma
Published: (2019)
by: Mahfoudh, Asma
Published: (2019)
A Code generator tool for the gamma design patterns / Novia Indriaty Admodisastro
by: Novia Indriaty, Admodisastro
Published: (2003)
by: Novia Indriaty, Admodisastro
Published: (2003)
A code generator tool for the gamma design patterns
by: Admodisastro, Novia Indriaty, et al.
Published: (2002)
by: Admodisastro, Novia Indriaty, et al.
Published: (2002)
An educational software design critiquing tool to support software design course
by: Mohd Ali, Norhayati, et al.
Published: (2013)
by: Mohd Ali, Norhayati, et al.
Published: (2013)
An architecture analysis approach for supporting black-box software development.
by: Admodisastro, Novia Indriaty, et al.
Published: (2011)
by: Admodisastro, Novia Indriaty, et al.
Published: (2011)
An enhancement of the random sequence 3-level obfuscated algorithm for protecting agents malicious hosts
by: Abu Bakar, Kamalrulnizam, et al.
Published: (2007)
by: Abu Bakar, Kamalrulnizam, et al.
Published: (2007)
Reputation aware obfuscation for mobile opportunistic networks
by: Radenkovic, Milena, et al.
Published: (2015)
by: Radenkovic, Milena, et al.
Published: (2015)
Inconsistency detection of model and code via critic-based approach
by: Mohammed, Osman, et al.
Published: (2017)
by: Mohammed, Osman, et al.
Published: (2017)
Pelajar UPM menang tempat ketiga ‘3 Days of Code Hackathon 2019’
by: Admodisastro, Novia
Published: (2019)
by: Admodisastro, Novia
Published: (2019)
A systematic mapping of quality models for AI systems, software and components
by: Ali, Mohamed Abdullahi, et al.
Published: (2022)
by: Ali, Mohamed Abdullahi, et al.
Published: (2022)
A Deeper Understanding on the Prohibition of Riba
by: Daryanani, Neelam
Published: (2008)
by: Daryanani, Neelam
Published: (2008)
Elevated novice developer productivity and self-efficacy by promoting UX Journey in software requirement elicitation
by: Kusuma, Wahyu Andhyka, et al.
Published: (2024)
by: Kusuma, Wahyu Andhyka, et al.
Published: (2024)
iXML : a process-pluggable ADL for supporting architectural analysis in component-based systems.
by: Admodisastro, Novia Indriaty, et al.
by: Admodisastro, Novia Indriaty, et al.
Usability requirements for architectural analysis tool to support CBD
by: Admodisastro, Novia Indriaty, et al.
Published: (2011)
by: Admodisastro, Novia Indriaty, et al.
Published: (2011)
iXML: a process-pluggable ADL for supporting architectural analysis in component-based systems
by: Admodisastro, Novia Indriaty, et al.
Published: (2012)
by: Admodisastro, Novia Indriaty, et al.
Published: (2012)
Malware detection using static analysis in android: A review of FeCO (features, classification, and obfuscation)
by: Rosmalissa, Jusoh, et al.
Published: (2021)
by: Rosmalissa, Jusoh, et al.
Published: (2021)
Kronic Hysteria: Emerging drugs and the consequences of prohibition
by: Bright, Stephen, et al.
Published: (2012)
by: Bright, Stephen, et al.
Published: (2012)
The internet poses unique challenges for drug prohibition.
by: Barratt, Monica
Published: (2012)
by: Barratt, Monica
Published: (2012)
A dynamic reconfiguration model of web services in service-oriented architecture
by: Ilahi, Rahmat, et al.
Published: (2017)
by: Ilahi, Rahmat, et al.
Published: (2017)
Right to transfer: prohibition and restraints / Mat Ghani Abdullah
by: Abdullah, Mat Ghani
Published: (1985)
by: Abdullah, Mat Ghani
Published: (1985)
Class diagram critic: a design critic tool for UML class diagram
by: Abdulkareem, Soran Mahmood, et al.
Published: (2017)
by: Abdulkareem, Soran Mahmood, et al.
Published: (2017)
Secure coding in software development
by: Zainuddin @ Zenah, Nor Harisah, et al.
Published: (2011)
by: Zainuddin @ Zenah, Nor Harisah, et al.
Published: (2011)
Rationalizing Islam’s prohibition of drawing images and erecting statues of humans
by: Omer, Spahic
Published: (2019)
by: Omer, Spahic
Published: (2019)
Prohibited elements in Islamic financial transactions: a comprehensive review
by: Saiti, Buerhan, et al.
Published: (2016)
by: Saiti, Buerhan, et al.
Published: (2016)
Prohibited elements in Fiqh al-Muamalat: causes that invalidate transactions
by: Saleem, Muhammad Yusuf, et al.
Published: (2012)
by: Saleem, Muhammad Yusuf, et al.
Published: (2012)
Application of the principles of ruling determination in the prohibition of blood plasma in food
by: Mohd Izhar Ariff Mohd Kashim,, et al.
Published: (2024)
by: Mohd Izhar Ariff Mohd Kashim,, et al.
Published: (2024)
Verifying the correctness of UML statechart outpatient clinic based on common modeling language and SMV
by: Abdul Samat, Pathiah, et al.
Published: (2021)
by: Abdul Samat, Pathiah, et al.
Published: (2021)
Towards cross-site scripting vulnerability detection in mobile web applications
by: Hydara, Isatou, et al.
Published: (2018)
by: Hydara, Isatou, et al.
Published: (2018)
Current state of research on cross-site scripting (XSS) – a systematic literature review
by: Hydara, Isatou, et al.
Published: (2015)
by: Hydara, Isatou, et al.
Published: (2015)
Removing cross-site scripting vulnerabilities from web applications using the OWASP ESAPI security guidelines
by: Hydara, Isatou, et al.
Published: (2015)
by: Hydara, Isatou, et al.
Published: (2015)
Removing cross-site scripting vulnerabilities from web applications using the OWASP ESAPI security guidelines
by: Hydara, Isatou, et al.
Published: (2015)
by: Hydara, Isatou, et al.
Published: (2015)
Cross-site scripting detection based on an enhanced genetic algorithm
by: Hydara, Isatou, et al.
Published: (2015)
by: Hydara, Isatou, et al.
Published: (2015)
Security impact of cross-site scripting vulnerabilities on web applications and their awareness
by: Hydara, Isatou, et al.
Published: (2022)
by: Hydara, Isatou, et al.
Published: (2022)
A study of computer-based learning model for students with dyslexia
by: Abdul Hamid, Siti Suhaila, et al.
Published: (2015)
by: Abdul Hamid, Siti Suhaila, et al.
Published: (2015)
Dynamic service adaptation framework for context aware Mobile Cloud Learning using semantic-based approach
by: Muhammad, Muhamad Sufri, et al.
Published: (2018)
by: Muhammad, Muhamad Sufri, et al.
Published: (2018)
Prioritizing based on crowd preferences to requirements elicited from crowd's sentiments
by: Abdul Aziz, Nurul Afiqah, et al.
Published: (2019)
by: Abdul Aziz, Nurul Afiqah, et al.
Published: (2019)
قواعد التحريم في المعاملات المالية الإسلامية = Rules of prohibition in Islamic financial
by: Daqqaq, Mahmoud Abdulrahman, et al.
Published: (2019)
by: Daqqaq, Mahmoud Abdulrahman, et al.
Published: (2019)
Decriminalization of prohibited drugs: a challenge to Muslim youths in a secular society
by: Tagoranao, Mariam Saidona, et al.
Published: (2017)
by: Tagoranao, Mariam Saidona, et al.
Published: (2017)
Cognitive-behaviour intervention in developing an adaptive learning model for students with dyslexia
by: Admodisastro, Novia Indriaty, et al.
Published: (2018)
by: Admodisastro, Novia Indriaty, et al.
Published: (2018)
Outdoor mobility assistive technologies for people with vision impairment or blindness – a state of the art
by: A., Malkawi, et al.
Published: (2019)
by: A., Malkawi, et al.
Published: (2019)
Similar Items
-
Enhancing obfuscation technique for protecting source code against software reverse engineering
by: Mahfoudh, Asma
Published: (2019) -
A Code generator tool for the gamma design patterns / Novia Indriaty Admodisastro
by: Novia Indriaty, Admodisastro
Published: (2003) -
A code generator tool for the gamma design patterns
by: Admodisastro, Novia Indriaty, et al.
Published: (2002) -
An educational software design critiquing tool to support software design course
by: Mohd Ali, Norhayati, et al.
Published: (2013) -
An architecture analysis approach for supporting black-box software development.
by: Admodisastro, Novia Indriaty, et al.
Published: (2011)