A SURVEY ON PROGRAM CODE OBFUSCATION TECHNIQUE
Journal Title: Engineering and Technology Journal - Year 2016, Vol 1, Issue 2
Abstract
Program code are distributed through internet and suffering from the program theft. Means a program is sold to user and user make own copyright of program called program theft. This is happen because program are easily decomposed into reusable class file and also decomposed into source code by the program users. In this paper practical work show that theft program can easily findable and also proposed a method that shows that if starts working on the method theft program are easily findable. Original developer of program can easily find the program theft and one another technique is watermarking technique that is also a successful technique help the original developer of program to finding program theft, some concept of watermarking also discuss in this paper. With the help of this paper people knows the actual power and use of obfuscator technique. Experimental result in the paper show that approach work successfully.
Authors and Affiliations
Gaurav Kumar
Evaluating Transferability of Attacks across Generative Models
The need for adversarial sample transferability is to attack black-box deep learning models. Whereas much recent work focuses on making untargeted adversarial attacks more transferable, there has been scarce research on...
Mechanical and Microstructural Properties of Steel Reinforcing Bars Produced from Different Manufacturing Industries as Available in Nigeria Market
The performance of reinforced concrete (RC) infrastructure in service is largely a function of the constituent materials and construction technology. However, lack of reliable information of the physical, mechanical and...
Evaluation of Straw Recycling Programs Based on Evidence-Prospect Theory
Farmland straw is one of the important agricultural resources, and its rational utilization is related to the green development of agriculture. In order to promote the utilization of straw resources, the rapid increase o...
PROPAEDEUTIC OF WORKING WITH TABLES FOR DATA HANDLING AT KINDERGARTEN
The article presents a model of work in Bulgarian Kindergarten to form knowledge and skills for basic data handling through working with data tables. The work is part of a larger study for building basic statistical lite...
Risk Management and Compliance in Healthcare Project Delivery: Lessons From West Africa
Risk management and compliance are critical to the successful delivery of healthcare projects, particularly in resource-constrained regions such as West Africa. This paper examines the complexities of risk governance and...