Trading Off a Vulnerability: Does Software Obfuscation Increase the Risk of ROP Attacks.
Harshvardhan P. JoshiAravindhan DhanasekaranRudra DuttaPublished in: J. Cyber Secur. Mobil. (2015)
Keyphrases
- security risks
- risk assessment
- security vulnerabilities
- static analysis
- control flow
- software development
- software systems
- reverse engineering
- security threats
- information security
- user interface
- countermeasures
- software tools
- risk management
- source code
- decision making
- watermarking scheme
- software maintenance
- software design
- high risk
- computer systems
- denial of service
- software projects
- risk factors
- network security
- software architecture
- intrusion detection
- anti virus