•  English
    • Persian
    • English
  •   Login
  • Ferdowsi University of Mashhad
  • |
  • Information Center and Central Library
    • Persian
    • English
  • Home
  • Source Types
    • Journal Paper
    • Ebook
    • Conference Paper
    • Standard
    • Protocol
    • Thesis
  • Use Help
View Item 
  •   FUM Digital Library
  • Fum
  • Articles
  • Latin Articles
  • View Item
  •   FUM Digital Library
  • Fum
  • Articles
  • Latin Articles
  • View Item
  • All Fields
  • Title
  • Author
  • Year
  • Publisher
  • Subject
  • Publication Title
  • ISSN
  • DOI
  • ISBN
Advanced Search
JavaScript is disabled for your browser. Some features of this site may not work without it.

Negligible time-consuming RC5 remote decoding technique

Author:
Singha, T.B.
,
Jain, L.
,
Kant, B.
Publisher:
IEEE
Year
: 2014
DOI: 10.1109/DASC.2014.20
URI: https://libsearch.um.ac.ir:443/fum/handle/fum/1034921
Keyword(s): Android (operating system),computer crime,data protection,reverse engineering,source code (software),Android Dalvik VM,Android app protection,SMOG,code obfuscation techniques,dynamic reverse engineering,executable code obfuscation system,executable code protection,execution environment,execution token,fine-grained level protection,interpretation obfuscation,malicious reproduction,meta information protection,obfuscated app,obfuscation engine,obfuscator,program understanding
Collections :
  • Latin Articles
  • Show Full MetaData Hide Full MetaData
  • Statistics

    Negligible time-consuming RC5 remote decoding technique

Show full item record

contributor authorSingha, T.B.
contributor authorJain, L.
contributor authorKant, B.
date accessioned2020-03-12T21:02:33Z
date available2020-03-12T21:02:33Z
date issued2014
identifier other6921832.pdf
identifier urihttps://libsearch.um.ac.ir:443/fum/handle/fum/1034921?locale-attribute=en
formatgeneral
languageEnglish
publisherIEEE
titleNegligible time-consuming RC5 remote decoding technique
typeConference Paper
contenttypeMetadata Only
identifier padid8160891
subject keywordsAndroid (operating system)
subject keywordscomputer crime
subject keywordsdata protection
subject keywordsreverse engineering
subject keywordssource code (software)
subject keywordsAndroid Dalvik VM
subject keywordsAndroid app protection
subject keywordsSMOG
subject keywordscode obfuscation techniques
subject keywordsdynamic reverse engineering
subject keywordsexecutable code obfuscation system
subject keywordsexecutable code protection
subject keywordsexecution environment
subject keywordsexecution token
subject keywordsfine-grained level protection
subject keywordsinterpretation obfuscation
subject keywordsmalicious reproduction
subject keywordsmeta information protection
subject keywordsobfuscated app
subject keywordsobfuscation engine
subject keywordsobfuscator
subject keywordsprogram understanding
identifier doi10.1109/DASC.2014.20
journal titleomputer Communication and Informatics (ICCCI), 2014 International Conference on
filesize304194
citations1
  • About Us
نرم افزار کتابخانه دیجیتال "دی اسپیس" فارسی شده توسط یابش برای کتابخانه های ایرانی | تماس با یابش
DSpace software copyright © 2019-2022  DuraSpace