НЕЙРОСЕТЕВАЯ ОБФУСКАЦИЯ ВЫЧИСЛЕНИЙ НАД ЗАШИФРОВАННЫМИ ДАННЫМИ [PDF]
Предложен подход по нейросетевой криптографической обфускации вычислений. Опираясь на ранее полученные результаты о свойстве строгой обфускации неразличимости для нейросетевого аппроксиматора, мы предлагаем использовать нейросети для выполнения ...
Елисеев Владимир Леонидович
openalex +3 more sources
Способ количественного сравнения обфусцирующих преобразований [PDF]
В работе рассматривается задача количественного сравнения эффективности и стойкости практически применяемых обфусцирующих преобразований программного кода.
Petr Borisov, Yury Kosolapov
doaj +3 more sources
Лексическая обфускация как инструмент для внедрения водяных знаков [PDF]
Рассмотрены понятия обфускации и водяных знаков. Проведено исследование программ, которые позволяют осуществлять обфускацию и внедрение водяных знаков одновременно.
Ю. Г. Вашинко +2 more
openalex +2 more sources
Обфускация комбинационных схем цифровых устройств от несанкционированного доступа [PDF]
The problems of designing modern VLSI and SoC are analyzed. The most difficult problems of design are problems of verification of projects at different stages of design.
Л. А. Золоторевич
openalex +2 more sources
О характеристиках символьного исполнения в задаче оценки качества обфусцирующих преобразований [PDF]
Obfuscation is used to protect programs from analysis and reverse engineering. There are theoretically effective and resistant obfuscation methods, but most of them are not implemented in practice yet.
Petr Borisov D. +3 more
core +2 more sources
Description of the approach to development of the obfuscating compiler
Nowadays protecting intellectual property rights for created software is very important because of many competing companies and ubiquitous piracy. The powerful technique for this protection is to obfuscate program code.
Sh. F. Kurmangaleev +2 more
doaj +1 more source
The current state of art in program obfuscations:definitions of obfuscation security
Program obfuscation is a semantic-preserving transformation aimed at bringing a program into such a form, which impedes the understanding of its algorithm and data structures or prevents extracting of some valuable information from the text of a program.
N. P. Varnovsky +3 more
doaj +1 more source
Implementing Obfuscating Transformations in the LLVM Compiler Infrastructure
The paper describes the methods for obfuscating C/C++ programs to prevent applying static analyzers to them. The methods are implemented within the well-known LLVM compiler infrastructure.
Victor Ivannikov +6 more
doaj +1 more source
Building an obfuscation compiler based on LLVM infrastructure
The paper describes the obfuscating transformations, which were implemented while developing an LLVM-based obfuscating compiler in ISP RAS. The proposed transformations are based on well-known obfuscation algorithms and are specifically improved to ...
V. P. Korchagin +3 more
doaj +1 more source
The Application of Compiler-based Obfuscation and Diversification for Program Signature Modification
Development of malware detection techniques leads to the evolution of anti-detection techniques. In this paper we discuss possibility of creating an automatic tool for signature modification.
A. R. Nurmukhametov
doaj +1 more source

