Results 11 to 20 of about 50,028 (274)

Two Steps to Obfuscation

open access: yesSocial Networks, 2014
This note addresses the historical antecedents of the 1998 PageRank measure of centrality.
Friedkin, Noah E., Johnsen, Eugene C.
core   +4 more sources

A note on the concept of obfuscation.

open access: yesТруды Института системного программирования РАН, 2004
In this paper we address the issue of defining security of program obfuscation. We argue that requirements to obfuscated programs may be different and are dependent on potential applications. Therefore three distinct models are suggested for studying the
N.P. Varnovsky
doaj   +2 more sources

Obfuscating Conjunctions [PDF]

open access: yesJournal of Cryptology, 2013
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Zvika Brakerski, Guy N. Rothblum
openaire   +3 more sources

Layered obfuscation: a taxonomy of software obfuscation techniques for layered security

open access: yesCybersecurity, 2020
Software obfuscation has been developed for over 30 years. A problem always confusing the communities is what security strength the technique can achieve.
Hui Xu   +3 more
doaj   +1 more source

Evaluation of Survivability of the Automatically Obfuscated Android Malware

open access: yesApplied Sciences, 2022
Malware is a growing threat to all mobile platforms and hundreds of new malicious applications are being detected every day. At the same time, the development of automated software obfuscation techniques allows for the easy production of new malware ...
Himanshu Patel   +9 more
doaj   +1 more source

Measuring Software Obfuscation Quality–A Systematic Literature Review

open access: yesIEEE Access, 2021
Software obfuscation techniques are increasingly being used to prevent attackers from exploiting security flaws and launching successful attacks. With research on software obfuscation techniques rapidly growing, many software obfuscation techniques with ...
Shouki A. Ebad   +2 more
doaj   +1 more source

APIASO: A Novel API Call Obfuscation Technique Based on Address Space Obscurity

open access: yesApplied Sciences, 2023
API calls are programming interfaces used by applications. When it is difficult for an analyst to perform a direct reverse analysis of a program, the API provides an important basis for analyzing the behavior and functionality of the program. API address
Yang Li   +5 more
doaj   +1 more source

Affine Determinant Programs: A Framework for Obfuscation and Witness Encryption [PDF]

open access: yes, 2020
An affine determinant program ADP: {0,1}^n → {0,1} is specified by a tuple (A,B_1,...,B_n) of square matrices over F_q and a function Eval: F_q → {0,1}, and evaluated on x \in {0,1}^n by computing Eval(det(A + sum_{i \in [n]} x_i B_i)).
Bartusek, James   +5 more
core   +2 more sources

Translingual Obfuscation [PDF]

open access: yes2016 IEEE European Symposium on Security and Privacy (EuroS&P), 2016
Program obfuscation is an important software protection technique that prevents attackers from revealing the programming logic and design of the software. We introduce translingual obfuscation, a new software obfuscation scheme which makes programs obscure by "misusing" the unique features of certain programming languages.
Pei Wang 0007   +4 more
openaire   +2 more sources

InfoScrub: Towards Attribute Privacy by Targeted Obfuscation [PDF]

open access: yes, 2021
Personal photos of individuals when shared online, apart from exhibiting a myriad of memorable details, also reveals a wide range of private information and potentially entails privacy risks (e.g., online harassment, tracking). To mitigate such risks, it
Fritz, Mario   +2 more
core   +2 more sources

Home - About - Disclaimer - Privacy