Results 11 to 20 of about 49,336 (256)

Universal quantum obfuscation for quantum non-linear functions

open access: yesFrontiers in Physics, 2023
Research on quantum cryptography has burgeoned in the recent decades and combined quantum mechanics and cryptography theory. Among the existing quantum cryptographic primitives, quantum obfuscation is an emergent force to be reckoned with.
Chuyue Pan, Tao Shang, Yuanjing Zhang 
doaj   +1 more source

Layered obfuscation: a taxonomy of software obfuscation techniques for layered security

open access: yesCybersecurity, 2020
Software obfuscation has been developed for over 30 years. A problem always confusing the communities is what security strength the technique can achieve.
Hui Xu   +3 more
doaj   +1 more source

ERMDS: A obfuscation dataset for evaluating robustness of learning-based malware detection system

open access: yesBenchCouncil Transactions on Benchmarks, Standards and Evaluations, 2023
Learning-based malware detection systems (LB-MDS) play a crucial role in defending computer systems from malicious attacks. Nevertheless, these systems can be vulnerable to various attacks, which can have significant consequences.
Lichen Jia   +3 more
doaj   +1 more source

Evaluation of Survivability of the Automatically Obfuscated Android Malware

open access: yesApplied Sciences, 2022
Malware is a growing threat to all mobile platforms and hundreds of new malicious applications are being detected every day. At the same time, the development of automated software obfuscation techniques allows for the easy production of new malware ...
Himanshu Patel   +9 more
doaj   +1 more source

InfoScrub: Towards Attribute Privacy by Targeted Obfuscation [PDF]

open access: yes, 2021
Personal photos of individuals when shared online, apart from exhibiting a myriad of memorable details, also reveals a wide range of private information and potentially entails privacy risks (e.g., online harassment, tracking). To mitigate such risks, it
Fritz, Mario   +2 more
core   +2 more sources

Measuring Software Obfuscation Quality–A Systematic Literature Review

open access: yesIEEE Access, 2021
Software obfuscation techniques are increasingly being used to prevent attackers from exploiting security flaws and launching successful attacks. With research on software obfuscation techniques rapidly growing, many software obfuscation techniques with ...
Shouki A. Ebad   +2 more
doaj   +1 more source

Affine Determinant Programs: A Framework for Obfuscation and Witness Encryption [PDF]

open access: yes, 2020
An affine determinant program ADP: {0,1}^n → {0,1} is specified by a tuple (A,B_1,...,B_n) of square matrices over F_q and a function Eval: F_q → {0,1}, and evaluated on x \in {0,1}^n by computing Eval(det(A + sum_{i \in [n]} x_i B_i)).
Bartusek, James   +5 more
core   +2 more sources

APIASO: A Novel API Call Obfuscation Technique Based on Address Space Obscurity

open access: yesApplied Sciences, 2023
API calls are programming interfaces used by applications. When it is difficult for an analyst to perform a direct reverse analysis of a program, the API provides an important basis for analyzing the behavior and functionality of the program. API address
Yang Li   +5 more
doaj   +1 more source

Understanding Obfuscated Code [PDF]

open access: yes14th IEEE International Conference on Program Comprehension (ICPC'06), 2006
Code obfuscation makes it harder for a security analyst to understand the malicious payload of a program. In most cases an analyst needs to study the program at the machine code level, with little or no extra information available, apart from his experience.
Madou, Matias   +2 more
openaire   +2 more sources

Assessment of Source Code Obfuscation Techniques [PDF]

open access: yes, 2016
Obfuscation techniques are a general category of software protections widely adopted to prevent malicious tampering of the code by making applications more difficult to understand and thus harder to modify.
Basile, Cataldo   +6 more
core   +2 more sources

Home - About - Disclaimer - Privacy