Results 1 to 10 of about 49,336 (256)
Quantum Obfuscation of Generalized Quantum Power Functions with Coefficient [PDF]
Quantum obfuscation is one of the important primitives in quantum cryptography that can be used to enhance the security of various quantum cryptographic schemes.
Yazhuo Jiang +3 more
doaj +2 more sources
Geospatial Imprecision With Constraints for Precision Public Health: Algorithm Development and Validation [PDF]
BackgroundLocation and environmental social determinants of health are increasingly important factors in both an individual’s health and the monitoring of community-level public health issues.
Daniel Harris, Chris Delcher
doaj +2 more sources
On the evaluation of android malware detectors against code-obfuscation techniques [PDF]
The Android mobile platform is the most popular and dominates the cell phone market. With the increasing use of Android, malware developers have become active in circumventing security measures by using various obfuscation techniques.
Umair Nawaz +2 more
doaj +2 more sources
Metrics for code obfuscation based on symbolic execution and N-scope complexity
Code obfuscation has been well developed as mitigated endogenous security technology, to effectively resist MATE attacks (e.g.reverse engineering).And it also has important value for the reasonable metrics of code obfuscation effect.Since symbolic ...
Yuqiang XIAO, Yunfei GUO, Yawen WANG
doaj +3 more sources
Differential Privacy Based Fingerprinting Obfuscation Mechanism Towards NetworkReconnaissance Deception [PDF]
Network fingerprinting detection is an important network reconnaissance method,which can be used by attackers to obtain the fingerprinting characteristics of the target network,and then provide support for subsequent targeted attacks.Fingerprinting ...
HE Yuan, XING Chang-you, ZHANG Guo-min, SONG Li-hua, YU Hang
doaj +1 more source
Optimizing RTL Code Obfuscation: New Methods Based on XML Syntax Tree
As the most widely used description code in digital circuits and system on chip (SoC), the security of register transfer level (RTL) code is extremely critical.
Hanwen Yi, Jin Zhang, Sheng Liu
doaj +1 more source
Obfuscating Conjunctions [PDF]
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Brakerski, Zvika, Rothblum, Guy N.
openaire +2 more sources
Control Flow Obfuscation Algorithm Based on Nesting Complexity [PDF]
The garbage code control flow obfuscation algorithm based on random insertion strategy has uncertain obfuscation potency and extra overhead.To solve the problem,a control flow Obfuscation algorithm based on Nesting Complexity(OB_NC) is proposed.The ...
WANG Lei,HOU Zhengfeng,XIANG Runzhao,SHI Zhaopeng
doaj +1 more source
Review of path branch obfuscation
Code obfuscation is a convenient and effective technique of software protection,which can combat MATE attacks based on reverse engineering.With the development of automatic programming analysis technology,a new code obfuscation technique which named path
Pu GENG, Yuefei ZHU
doaj +3 more sources
With the increasing complexity of software functions and the evolving technologies of network attacks, malicious behaviors such as software piracy, software cracking, data leakage, and malicious software modification are on the rise.As a result, software
Qingfeng WANG, Hao LIANG, Yawen WANG, Genlin XIE, Benwei HE
doaj +3 more sources

