Results 1 to 10 of about 49,495 (160)

Geospatial Imprecision With Constraints for Precision Public Health: Algorithm Development and Validation [PDF]

open access: yesOnline Journal of Public Health Informatics
BackgroundLocation and environmental social determinants of health are increasingly important factors in both an individual’s health and the monitoring of community-level public health issues.
Daniel Harris, Chris Delcher
doaj   +2 more sources

On the evaluation of android malware detectors against code-obfuscation techniques [PDF]

open access: yesPeerJ Computer Science, 2022
The Android mobile platform is the most popular and dominates the cell phone market. With the increasing use of Android, malware developers have become active in circumventing security measures by using various obfuscation techniques.
Umair Nawaz   +2 more
doaj   +2 more sources

Metrics for code obfuscation based on symbolic execution and N-scope complexity

open access: yes网络与信息安全学报, 2022
Code obfuscation has been well developed as mitigated endogenous security technology, to effectively resist MATE attacks (e.g.reverse engineering).And it also has important value for the reasonable metrics of code obfuscation effect.Since symbolic ...
Yuqiang XIAO, Yunfei GUO, Yawen WANG
doaj   +3 more sources

Differential Privacy Based Fingerprinting Obfuscation Mechanism Towards NetworkReconnaissance Deception [PDF]

open access: yesJisuanji kexue, 2022
Network fingerprinting detection is an important network reconnaissance method,which can be used by attackers to obtain the fingerprinting characteristics of the target network,and then provide support for subsequent targeted attacks.Fingerprinting ...
HE Yuan, XING Chang-you, ZHANG Guo-min, SONG Li-hua, YU Hang
doaj   +1 more source

Optimizing RTL Code Obfuscation: New Methods Based on XML Syntax Tree

open access: yesApplied Sciences, 2023
As the most widely used description code in digital circuits and system on chip (SoC), the security of register transfer level (RTL) code is extremely critical.
Hanwen Yi, Jin Zhang, Sheng Liu
doaj   +1 more source

Obfuscating Conjunctions [PDF]

open access: yesJournal of Cryptology, 2013
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Brakerski, Zvika, Rothblum, Guy N.
openaire   +2 more sources

Control Flow Obfuscation Algorithm Based on Nesting Complexity [PDF]

open access: yesJisuanji gongcheng, 2016
The garbage code control flow obfuscation algorithm based on random insertion strategy has uncertain obfuscation potency and extra overhead.To solve the problem,a control flow Obfuscation algorithm based on Nesting Complexity(OB_NC) is proposed.The ...
WANG Lei,HOU Zhengfeng,XIANG Runzhao,SHI Zhaopeng
doaj   +1 more source

Review of path branch obfuscation

open access: yes网络与信息安全学报, 2020
Code obfuscation is a convenient and effective technique of software protection,which can combat MATE attacks based on reverse engineering.With the development of automatic programming analysis technology,a new code obfuscation technique which named path
Pu GENG, Yuefei ZHU
doaj   +3 more sources

Constructing method of opaque predicate based on type conversion and operation of floating point numbers

open access: yes网络与信息安全学报, 2023
With the increasing complexity of software functions and the evolving technologies of network attacks, malicious behaviors such as software piracy, software cracking, data leakage, and malicious software modification are on the rise.As a result, software
Qingfeng WANG, Hao LIANG, Yawen WANG, Genlin XIE, Benwei HE
doaj   +3 more sources

Universal quantum obfuscation for quantum non-linear functions

open access: yesFrontiers in Physics, 2023
Research on quantum cryptography has burgeoned in the recent decades and combined quantum mechanics and cryptography theory. Among the existing quantum cryptographic primitives, quantum obfuscation is an emergent force to be reckoned with.
Chuyue Pan, Tao Shang, Yuanjing Zhang 
doaj   +1 more source

Home - About - Disclaimer - Privacy