Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (2)
  • Open Access

    ARTICLE

    Advancing Code Obfuscation: Novel Opaque Predicate Techniques to Counter Dynamic Symbolic Execution

    Yan Cao#, Zhizhuang Zhou#, Yan Zhuang*

    CMC-Computers, Materials & Continua, Vol.84, No.1, pp. 1545-1565, 2025, DOI:10.32604/cmc.2025.062743 - 09 June 2025

    Abstract Code obfuscation is a crucial technique for protecting software against reverse engineering and security attacks. Among various obfuscation methods, opaque predicates, which are recognized as flexible and promising, are widely used to increase control-flow complexity. However, traditional opaque predicates are increasingly vulnerable to Dynamic Symbolic Execution (DSE) attacks, which can efficiently identify and eliminate them. To address this issue, this paper proposes a novel approach for anti-DSE opaque predicates that effectively resists symbolic execution-based deobfuscation. Our method introduces two key techniques: single-way function opaque predicates, which leverage hash functions and logarithmic transformations to prevent constraint More >

  • Open Access

    ARTICLE

    Malware Attacks Detection in IoT Using Recurrent Neural Network (RNN)

    Abeer Abdullah Alsadhan1, Abdullah A. Al-Atawi2, Hanen karamti3, Abid Jameel4, Islam Zada5, Tan N. Nguyen6,*

    Intelligent Automation & Soft Computing, Vol.39, No.2, pp. 135-155, 2024, DOI:10.32604/iasc.2023.041130 - 21 May 2024

    Abstract IoT (Internet of Things) devices are being used more and more in a variety of businesses and for a variety of tasks, such as environmental data collection in both civilian and military situations. They are a desirable attack target for malware intended to infect specific IoT devices due to their growing use in a variety of applications and their increasing computational and processing power. In this study, we investigate the possibility of detecting IoT malware using recurrent neural networks (RNNs). RNN is used in the proposed method to investigate the execution operation codes of ARM-based More >

Displaying 1-10 on page 1 of 2. Per Page