Mimimorphism: a new approach to binary code obfuscation
Proceedings of the 17th ACM conference on Computer and communications security
Hi-index | 0.00 |
Protecting application software from reverse engineering and piracy is key to ensuring the integrity of intellectual property and critical infrastructures. Unorthodox protection strategies can help mitigate these types of attacks. Such strategies must include random, dynamic protections to complicate the ease with which attackers can overcome standard approaches.