Diversified Compilation Method Based on LLVM
When diversifying projects composed of multiple C/C++ source files, most of the existing software diversification tools adopt the same diversification method for all functions in a single C/C++ source file, which leads to a single diversification method for each function or source file and a lack of...
| Published in: | Jisuanji gongcheng |
|---|---|
| Main Author: | CHEN Yingchao, WANG Junchao, PANG Jianmin, YUE Feng |
| Format: | Article |
| Language: | English |
| Published: |
Editorial Office of Computer Engineering
2025-07-01
|
| Subjects: | |
| Online Access: | https://www.ecice06.com/fileup/1000-3428/PDF/jsjgc-51-7-275.pdf |
Similar Items
Method of diversity software protection based on fusion compilation
by: Xiaobing XIONG, et al.
Published: (2020-12-01)
by: Xiaobing XIONG, et al.
Published: (2020-12-01)
Method of diversity software protection based on fusion compilation
by: XIONG Xiaobing, SHU Hui, KANG Fei
Published: (2020-12-01)
by: XIONG Xiaobing, SHU Hui, KANG Fei
Published: (2020-12-01)
Method of quantitative assessment for diversified software system
by: Yuan YAO, et al.
Published: (2020-03-01)
by: Yuan YAO, et al.
Published: (2020-03-01)
Method of quantitative assessment for diversified software system
by: Yuan YAO, et al.
Published: (2020-03-01)
by: Yuan YAO, et al.
Published: (2020-03-01)
VCF: Virtual Code Folding to Enhance Virtualization Obfuscation
by: Jae Hyuk Suk, et al.
Published: (2020-01-01)
by: Jae Hyuk Suk, et al.
Published: (2020-01-01)
Enhancing resilience in IoT cybersecurity: the roles of obfuscation and diversification techniques for improving the multilayered cybersecurity of IoT systems
by: Sampsa Rauti, et al.
Published: (2024-01-01)
by: Sampsa Rauti, et al.
Published: (2024-01-01)
The Technique of Binary Code Decompilation and Its Application in Information Security Sphere
by: M. O. Shudrak, et al.
Published: (2012-12-01)
by: M. O. Shudrak, et al.
Published: (2012-12-01)
BinCodex: A comprehensive and multi-level dataset for evaluating binary code similarity detection techniques
by: Peihua Zhang, et al.
Published: (2024-06-01)
by: Peihua Zhang, et al.
Published: (2024-06-01)
Design and Evaluation of the De-obfuscation Method against the Identifier Renaming Methods
by: Yosuke Isobe, et al.
Published: (2018-09-01)
by: Yosuke Isobe, et al.
Published: (2018-09-01)
Design and Optimization of LLVM Compiler for Domestic High Performance Accelerator
by: SONG Qiang, TANG Junlong, CHEN Zhaoyun, SHI Yang, TAN Qixuan, XIAO Ziyang, ZOU Wanghui
Published: (2024-04-01)
by: SONG Qiang, TANG Junlong, CHEN Zhaoyun, SHI Yang, TAN Qixuan, XIAO Ziyang, ZOU Wanghui
Published: (2024-04-01)
Compiler-supported Program Stack Space Layout Runtime Randomization Method
by: ZHU Pengzhe, YAO Yuan, LIU Zijing, XI Ruicheng
Published: (2023-08-01)
by: ZHU Pengzhe, YAO Yuan, LIU Zijing, XI Ruicheng
Published: (2023-08-01)
Decision-Making to Diversify Farm Systems for Climate Change Adaptation
by: Maarten van Zonneveld, et al.
Published: (2020-04-01)
by: Maarten van Zonneveld, et al.
Published: (2020-04-01)
Hardware and Software Methods for Secure Obfuscation and Deobfuscation: An In-Depth Analysis
by: Khaled Saleh, et al.
Published: (2025-06-01)
by: Khaled Saleh, et al.
Published: (2025-06-01)
UnSafengine64: A Safengine Unpacker for 64-Bit Windows Environments and Detailed Analysis Results on Safengine 2.4.0
by: Seokwoo Choi, et al.
Published: (2024-01-01)
by: Seokwoo Choi, et al.
Published: (2024-01-01)
A Framework to Quantify the Quality of Source Code Obfuscation
by: Hongjoo Jin, et al.
Published: (2024-06-01)
by: Hongjoo Jin, et al.
Published: (2024-06-01)
The algorithm and implementation of an extension to LLVM for solving the blocking between instruction sink and division-modulo combine
by: YungYu Zhuang, et al.
Published: (2023-12-01)
by: YungYu Zhuang, et al.
Published: (2023-12-01)
Non-Diversifiable Risk in Investment Portfolios --- an Aid to Investment Decision Making
by: Emma Anyika
Published: (2015-04-01)
by: Emma Anyika
Published: (2015-04-01)
Sugarcane for Diversified Uses
by: M. Shanthi Priya, et al.
Published: (2016-09-01)
by: M. Shanthi Priya, et al.
Published: (2016-09-01)
Review of Research on Deep Learning Compiler
by: LIU Zhengyu, ZHANG Fan, QI Xiaofeng, GAO Yanzhao, SONG Yijing, FAN Wang
Published: (2025-08-01)
by: LIU Zhengyu, ZHANG Fan, QI Xiaofeng, GAO Yanzhao, SONG Yijing, FAN Wang
Published: (2025-08-01)
Automatic Vectorization Transplant and Optimization of LLVM for Domestic Processors
by: LI Jia'nan, HAN Lin, CHAI Yunda
Published: (2022-01-01)
by: LI Jia'nan, HAN Lin, CHAI Yunda
Published: (2022-01-01)
Anti-semantic Analysis Script Fusion Technology
by: TIAN Bowen, YANG Ju, XIONG Xiaobing, DUAN Shuang, WEI Ran
Published: (2025-01-01)
by: TIAN Bowen, YANG Ju, XIONG Xiaobing, DUAN Shuang, WEI Ran
Published: (2025-01-01)
A Machine Learning Based Compiler Optimization Technique
by: Salwa iqbal, et al.
Published: (2024-07-01)
by: Salwa iqbal, et al.
Published: (2024-07-01)
PoMMES: Prevention of Micro-architectural Leakages in Masked Embedded Software
by: Jannik Zeitschner, et al.
Published: (2024-07-01)
by: Jannik Zeitschner, et al.
Published: (2024-07-01)
Code Obfuscation: A Comprehensive Approach to Detection, Classification, and Ethical Challenges
by: Tomer Raitsis, et al.
Published: (2025-01-01)
by: Tomer Raitsis, et al.
Published: (2025-01-01)
Protecting Encrypted Signature Functions Against Intrusions on Computing Devices by Obfuscation
by: Yang Shi, et al.
Published: (2016-01-01)
by: Yang Shi, et al.
Published: (2016-01-01)
Designing RISC-V Instruction Set Extensions for Artificial Neural Networks: An LLVM Compiler-Driven Perspective
by: Karthikeyan Kalyanasundaram Balasubramanian, et al.
Published: (2024-01-01)
by: Karthikeyan Kalyanasundaram Balasubramanian, et al.
Published: (2024-01-01)
Dynamic Compilation for Transprecision Applications on Heterogeneous Platform
by: Julie Dumas, et al.
Published: (2021-06-01)
by: Julie Dumas, et al.
Published: (2021-06-01)
Metrics for code obfuscation based on symbolic execution and N-scope complexity
by: Yuqiang XIAO, et al.
Published: (2022-12-01)
by: Yuqiang XIAO, et al.
Published: (2022-12-01)
Metrics for code obfuscation based on symbolic execution and N-scope complexity
by: Yuqiang XIAO, Yunfei GUO, Yawen WANG
Published: (2022-12-01)
by: Yuqiang XIAO, Yunfei GUO, Yawen WANG
Published: (2022-12-01)
Binary Code-Oriented Fine-Grained Software Diversification Method
by: Benwei HE, Yunfei GUO, Hao LIANG, Qingfeng WANG
Published: (2024-01-01)
by: Benwei HE, Yunfei GUO, Hao LIANG, Qingfeng WANG
Published: (2024-01-01)
Research on deception defense techniques based on network characteristics obfuscation
by: Jinlong ZHAO, et al.
Published: (2021-08-01)
by: Jinlong ZHAO, et al.
Published: (2021-08-01)
Software watermarking scheme with cloud computing constraints
by: Guang SUN, et al.
Published: (2016-09-01)
by: Guang SUN, et al.
Published: (2016-09-01)
Evaluation of Survivability of the Automatically Obfuscated Android Malware
by: Himanshu Patel, et al.
Published: (2022-05-01)
by: Himanshu Patel, et al.
Published: (2022-05-01)
Designing, translation – learning & evaluation of a Greek/English writing to Braille
by: Alexandros Aggelis
Published: (2018-04-01)
by: Alexandros Aggelis
Published: (2018-04-01)
C Source code Obfuscation using Hash Function and Encryption Algorithm
by: Sarah Rosdiana Tambunan, et al.
Published: (2023-07-01)
by: Sarah Rosdiana Tambunan, et al.
Published: (2023-07-01)
TOPICAL ISSUES OF DIVERSIFIED POLICY AND SUSTAINABLE ECONOMY OF AZERBAIJAN
by: M. Y. Guliyev
Published: (2016-07-01)
by: M. Y. Guliyev
Published: (2016-07-01)
Identifying Compiler and Optimization Level in Binary Code From Multiple Architectures
by: Davide Pizzolotto, et al.
Published: (2021-01-01)
by: Davide Pizzolotto, et al.
Published: (2021-01-01)
Review of path branch obfuscation
by: Pu GENG, et al.
Published: (2020-04-01)
by: Pu GENG, et al.
Published: (2020-04-01)
Optimization Method of Streaming Storage Based on GCC Compiler
by: GAO Xiu-wu, HUANG Liang-ming, JIANG Jun
Published: (2022-11-01)
by: GAO Xiu-wu, HUANG Liang-ming, JIANG Jun
Published: (2022-11-01)
Transpilers: A Systematic Mapping Review of Their Usage in Research and Industry
by: Andrés Bastidas Fuertes, et al.
Published: (2023-03-01)
by: Andrés Bastidas Fuertes, et al.
Published: (2023-03-01)
Similar Items
-
Method of diversity software protection based on fusion compilation
by: Xiaobing XIONG, et al.
Published: (2020-12-01) -
Method of diversity software protection based on fusion compilation
by: XIONG Xiaobing, SHU Hui, KANG Fei
Published: (2020-12-01) -
Method of quantitative assessment for diversified software system
by: Yuan YAO, et al.
Published: (2020-03-01) -
Method of quantitative assessment for diversified software system
by: Yuan YAO, et al.
Published: (2020-03-01) -
VCF: Virtual Code Folding to Enhance Virtualization Obfuscation
by: Jae Hyuk Suk, et al.
Published: (2020-01-01)
