Obfuscation by code fragmentation to evade reverse engineering.
Vivek BalachandranSabu EmmanuelWee Keong NgPublished in: SMC (2014)
Keyphrases
- reverse engineering
- program understanding
- reverse engineer
- malicious code
- dynamic analysis
- software engineering
- legacy systems
- software metrics
- software maintenance
- business rules
- gene regulatory networks
- legacy software systems
- software product
- source code
- program slicing
- object oriented
- conceptual schema
- databases
- data flow
- artificial intelligence
- computer aided design
- software evolution
- software engineers
- case study
- platform independent
- information systems
- machine learning