Enhancing obfuscation technique for protecting source code against software reverse engineering
Obfuscation (Obfu) is a practice to make the programming code complicated to protect the Intellectual Property (IP) and prevent prohibited software Reverse Engineering (RE). Obfuscation involves transforming potentially revealing data, renaming useful classes and variables (identifiers) names to...
| Main Author: | Mahfoudh, Asma |
|---|---|
| Format: | Thesis |
| Language: | English |
| Published: |
2019
|
| Subjects: | |
| Online Access: | http://psasir.upm.edu.my/id/eprint/90724/ http://psasir.upm.edu.my/id/eprint/90724/1/FSKTM%202020%206%20IR.pdf |
Similar Items
Hybrid obfuscation technique to protect source code from prohibited software reverse engineering
by: Al-Hakimi, Asma'a Mahfoud Hezam, et al.
Published: (2020)
by: Al-Hakimi, Asma'a Mahfoud Hezam, et al.
Published: (2020)
Dynamic colour text steganography model using rgb coding and character spacing to improve capacity, invisibility and security
by: Thabit, Reema Ahmed Abdalla
Published: (2022)
by: Thabit, Reema Ahmed Abdalla
Published: (2022)
Analysis of Reverse Logistics Management in China
by: Zhu, Xiaoqi
Published: (2007)
by: Zhu, Xiaoqi
Published: (2007)
Designing a Software Maintenance System Using a Reverse Engineering Approach
by: Al-Fawareh, Hamed Jasem
Published: (1998)
by: Al-Fawareh, Hamed Jasem
Published: (1998)
Comparison of contact and non-contact reverse engineering techniques for free-form surfaces with coordinate measuring machine and 3D laser
by: Abd. Manaf, Ismanizam
Published: (2009)
by: Abd. Manaf, Ismanizam
Published: (2009)
Improving consistency of UML and its implementation using reverse engineering approach
by: Kaliappan, Vasanthi
Published: (2018)
by: Kaliappan, Vasanthi
Published: (2018)
Development of a hybrid dynamic fuzzy encoder and decoder model for colour QR code
by: Badawi, Bakri
Published: (2022)
by: Badawi, Bakri
Published: (2022)
Journal of Open Source Software (JOSS): design and first-year review
by: Smith, Arfon M., et al.
Published: (2018)
by: Smith, Arfon M., et al.
Published: (2018)
Developing the ZigBee Based Data Payload Coding for Data Communication in Microgrids
by: Setiawan, M., et al.
Published: (2014)
by: Setiawan, M., et al.
Published: (2014)
Robust communication in differential relay protection using wireless technique
by: Badar, Malik Qasim
Published: (2015)
by: Badar, Malik Qasim
Published: (2015)
Hybrid QR code student attendance system using firebase and react / Muhammad Aiman Abd mutalib
by: Abd mutalib, Muhammad Aiman
Published: (2020)
by: Abd mutalib, Muhammad Aiman
Published: (2020)
Efficiency improvements for small-scale reverse-osmosis systems
by: Susanto-Lee, Robertus
Published: (2006)
by: Susanto-Lee, Robertus
Published: (2006)
Design Of Direct Sequence Code Division Multiple Access (Ds-Cdma) Wireless Transmitter Using Field Programmable Gate Array (Fpga)
by: Osman, Khalid Eltahir Mohamed
Published: (2002)
by: Osman, Khalid Eltahir Mohamed
Published: (2002)
Automated data process in participatory sensing using QR-code and EAN-13 barcode
by: Che Ya, Mohamad Fakhrul Syafiq
Published: (2018)
by: Che Ya, Mohamad Fakhrul Syafiq
Published: (2018)
Critical barriers in implementing reverse logistics in the Chinese manufacturing sectors
by: Abdulrahman, Muhammad D., et al.
Published: (2014)
by: Abdulrahman, Muhammad D., et al.
Published: (2014)
Access control model based on trust, purpose, and role in materialized view for privacy protection
by: Salji, Mohd Rafiz
Published: (2019)
by: Salji, Mohd Rafiz
Published: (2019)
A modeling study on alleviating uneven defrosting for a vertical three-circuit outdoor coil in an air source heat pump unit during reverse cycle defrosting
by: Song, Mengjie, et al.
Published: (2016)
by: Song, Mengjie, et al.
Published: (2016)
KEEL 3.0: an open source software for multi-stage analysis in data mining
by: Triguero, Isaac, et al.
Published: (2017)
by: Triguero, Isaac, et al.
Published: (2017)
Incorporating Object-Oriented Metrics Into A Reverse Engineering Tool
by: Eshah, Nida Bashir
Published: (2003)
by: Eshah, Nida Bashir
Published: (2003)
Time order reversals and saccades
by: Kresevic, Jesse L., et al.
Published: (2016)
by: Kresevic, Jesse L., et al.
Published: (2016)
Regulatory fit and preference reversal
by: Roy, Rajat
Published: (2008)
by: Roy, Rajat
Published: (2008)
Low power text compression using Huffman coding with power management controller
by: Mohammed, Maan Hameed
Published: (2016)
by: Mohammed, Maan Hameed
Published: (2016)
Incoherent hybrid subcarrier multiplexed spectral-amplitude-coding optical CDMA system using direct decoding detection technique
by: Sahbudin, Ratna Kalos Zakiah, et al.
Published: (2007)
by: Sahbudin, Ratna Kalos Zakiah, et al.
Published: (2007)
Integration of protein data sources through PO
by: Sidhu, Amandeep, et al.
Published: (2006)
by: Sidhu, Amandeep, et al.
Published: (2006)
Ultrasonic defouling of reverse osmosis membranes used to treat wastewater effluents
by: Feng, D., et al.
Published: (2006)
by: Feng, D., et al.
Published: (2006)
Development of multi-service code family for spectral amplitude coding - optical code division multiple access systems
by: Kaka, Majid Hayas
Published: (2013)
by: Kaka, Majid Hayas
Published: (2013)
Recovery of Heavy Metals from Chrome - Plating Rinse Wastewater by Reverse Osmosis
by: Keethanchali, Nagaretnam
Published: (1999)
by: Keethanchali, Nagaretnam
Published: (1999)
How to obtain lattices from (f,σ,δ)-codes via a generalization of Construction A
by: Pumpluen, Susanne
Published: (2018)
by: Pumpluen, Susanne
Published: (2018)
A study of Chinese restaurant reverse logistics: Issues and challenges of kitchen waste disposal
by: Shi, Jingwei
Published: (2017)
by: Shi, Jingwei
Published: (2017)
Engine-driven synchronous generators: design considerations for grid code compliance
by: Narayanan, Sridhar
Published: (2019)
by: Narayanan, Sridhar
Published: (2019)
Recovery of Heavy Metals from Eletroplating Rinse Wastewater by Reverse Osmosis
by: See, Boon Yan
Published: (1996)
by: See, Boon Yan
Published: (1996)
Playing the legal card: using ideation cards to raise data protection issues within the design process
by: Luger, Ewa, et al.
Published: (2015)
by: Luger, Ewa, et al.
Published: (2015)
^muzicode$: composing and performing musical codes
by: Greenhalgh, Chris, et al.
Published: (2016)
by: Greenhalgh, Chris, et al.
Published: (2016)
Developing smart assignment management system using Quick Response (QR) code / Wan Muhammad Khair Mohd Nasir
by: Mohd Nasir, Wan Muhammad Khair
Published: (2019)
by: Mohd Nasir, Wan Muhammad Khair
Published: (2019)
Code-switching amongst UiTM B. Ed. TESL students: awareness, frequency and situations / Adam Zulhilmi Ahmad
by: Ahmad, Adam Zulhilmi
Published: (2014)
by: Ahmad, Adam Zulhilmi
Published: (2014)
An enhancement of the random sequence 3-level obfuscated algorithm for protecting agents malicious hosts
by: Abu Bakar, Kamalrulnizam, et al.
Published: (2007)
by: Abu Bakar, Kamalrulnizam, et al.
Published: (2007)
Critically evaluate how and why suppliers circumvent complaince codes. To what extend are social audit frameworks effective in managing sourcing risks.
by: Chen, yusheng
Published: (2006)
by: Chen, yusheng
Published: (2006)
The nonassociative algebras used to build fast-decodable space-time block codes
by: Pumpluen, Susanne, et al.
Published: (2015)
by: Pumpluen, Susanne, et al.
Published: (2015)
Cancer reversion with oocyte extracts is mediated by cell cycle arrest and induction of tumour dormancy
by: Saad, Norazalina, et al.
Published: (2018)
by: Saad, Norazalina, et al.
Published: (2018)
DFIG-based WECS Fault Ride through Complying with Australian Grid Codes
by: Khamaira, Mahmoud Yousef, et al.
Published: (2014)
by: Khamaira, Mahmoud Yousef, et al.
Published: (2014)
Similar Items
-
Hybrid obfuscation technique to protect source code from prohibited software reverse engineering
by: Al-Hakimi, Asma'a Mahfoud Hezam, et al.
Published: (2020) -
Dynamic colour text steganography model using rgb coding and character spacing to improve capacity, invisibility and security
by: Thabit, Reema Ahmed Abdalla
Published: (2022) -
Analysis of Reverse Logistics Management in China
by: Zhu, Xiaoqi
Published: (2007) -
Designing a Software Maintenance System Using a Reverse Engineering Approach
by: Al-Fawareh, Hamed Jasem
Published: (1998) -
Comparison of contact and non-contact reverse engineering techniques for free-form surfaces with coordinate measuring machine and 3D laser
by: Abd. Manaf, Ismanizam
Published: (2009)