Enhance virtual-machine-based code obfuscation security through dynamic bytecode scheduling.
Kaiyuan KuangZhanyong TangXiaoqing GongDingyi FangXiaojiang ChenZheng WangPublished in: Comput. Secur. (2018)
Keyphrases
- virtual machine
- java card
- static analysis
- windows xp
- operating system
- java virtual machine
- dynamic analysis
- cloud computing environment
- remote attestation
- java bytecode
- data center
- source code
- distributed computing
- control flow
- network access
- malware detection
- anti virus
- access control
- security requirements
- database
- security issues
- reverse engineering
- scheduling algorithm
- smart card
- open source
- scheduling problem
- data mining
- computer security
- security mechanisms
- countermeasures
- cloud services
- virtual memory
- intrusion detection