Results 11 to 20 of about 49,336 (256)
Universal quantum obfuscation for quantum non-linear functions
Research on quantum cryptography has burgeoned in the recent decades and combined quantum mechanics and cryptography theory. Among the existing quantum cryptographic primitives, quantum obfuscation is an emergent force to be reckoned with.
Chuyue Pan, Tao Shang, Yuanjing Zhang
doaj +1 more source
Layered obfuscation: a taxonomy of software obfuscation techniques for layered security
Software obfuscation has been developed for over 30 years. A problem always confusing the communities is what security strength the technique can achieve.
Hui Xu +3 more
doaj +1 more source
ERMDS: A obfuscation dataset for evaluating robustness of learning-based malware detection system
Learning-based malware detection systems (LB-MDS) play a crucial role in defending computer systems from malicious attacks. Nevertheless, these systems can be vulnerable to various attacks, which can have significant consequences.
Lichen Jia +3 more
doaj +1 more source
Evaluation of Survivability of the Automatically Obfuscated Android Malware
Malware is a growing threat to all mobile platforms and hundreds of new malicious applications are being detected every day. At the same time, the development of automated software obfuscation techniques allows for the easy production of new malware ...
Himanshu Patel +9 more
doaj +1 more source
InfoScrub: Towards Attribute Privacy by Targeted Obfuscation [PDF]
Personal photos of individuals when shared online, apart from exhibiting a myriad of memorable details, also reveals a wide range of private information and potentially entails privacy risks (e.g., online harassment, tracking). To mitigate such risks, it
Fritz, Mario +2 more
core +2 more sources
Measuring Software Obfuscation Quality–A Systematic Literature Review
Software obfuscation techniques are increasingly being used to prevent attackers from exploiting security flaws and launching successful attacks. With research on software obfuscation techniques rapidly growing, many software obfuscation techniques with ...
Shouki A. Ebad +2 more
doaj +1 more source
Affine Determinant Programs: A Framework for Obfuscation and Witness Encryption [PDF]
An affine determinant program ADP: {0,1}^n → {0,1} is specified by a tuple (A,B_1,...,B_n) of square matrices over F_q and a function Eval: F_q → {0,1}, and evaluated on x \in {0,1}^n by computing Eval(det(A + sum_{i \in [n]} x_i B_i)).
Bartusek, James +5 more
core +2 more sources
APIASO: A Novel API Call Obfuscation Technique Based on Address Space Obscurity
API calls are programming interfaces used by applications. When it is difficult for an analyst to perform a direct reverse analysis of a program, the API provides an important basis for analyzing the behavior and functionality of the program. API address
Yang Li +5 more
doaj +1 more source
Understanding Obfuscated Code [PDF]
Code obfuscation makes it harder for a security analyst to understand the malicious payload of a program. In most cases an analyst needs to study the program at the machine code level, with little or no extra information available, apart from his experience.
Madou, Matias +2 more
openaire +2 more sources
Assessment of Source Code Obfuscation Techniques [PDF]
Obfuscation techniques are a general category of software protections widely adopted to prevent malicious tampering of the code by making applications more difficult to understand and thus harder to modify.
Basile, Cataldo +6 more
core +2 more sources

