Results 11 to 20 of about 50,028 (274)
This note addresses the historical antecedents of the 1998 PageRank measure of centrality.
Friedkin, Noah E., Johnsen, Eugene C.
core +4 more sources
A note on the concept of obfuscation.
In this paper we address the issue of defining security of program obfuscation. We argue that requirements to obfuscated programs may be different and are dependent on potential applications. Therefore three distinct models are suggested for studying the
N.P. Varnovsky
doaj +2 more sources
Obfuscating Conjunctions [PDF]
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Zvika Brakerski, Guy N. Rothblum
openaire +3 more sources
Layered obfuscation: a taxonomy of software obfuscation techniques for layered security
Software obfuscation has been developed for over 30 years. A problem always confusing the communities is what security strength the technique can achieve.
Hui Xu +3 more
doaj +1 more source
Evaluation of Survivability of the Automatically Obfuscated Android Malware
Malware is a growing threat to all mobile platforms and hundreds of new malicious applications are being detected every day. At the same time, the development of automated software obfuscation techniques allows for the easy production of new malware ...
Himanshu Patel +9 more
doaj +1 more source
Measuring Software Obfuscation Quality–A Systematic Literature Review
Software obfuscation techniques are increasingly being used to prevent attackers from exploiting security flaws and launching successful attacks. With research on software obfuscation techniques rapidly growing, many software obfuscation techniques with ...
Shouki A. Ebad +2 more
doaj +1 more source
APIASO: A Novel API Call Obfuscation Technique Based on Address Space Obscurity
API calls are programming interfaces used by applications. When it is difficult for an analyst to perform a direct reverse analysis of a program, the API provides an important basis for analyzing the behavior and functionality of the program. API address
Yang Li +5 more
doaj +1 more source
Affine Determinant Programs: A Framework for Obfuscation and Witness Encryption [PDF]
An affine determinant program ADP: {0,1}^n → {0,1} is specified by a tuple (A,B_1,...,B_n) of square matrices over F_q and a function Eval: F_q → {0,1}, and evaluated on x \in {0,1}^n by computing Eval(det(A + sum_{i \in [n]} x_i B_i)).
Bartusek, James +5 more
core +2 more sources
Translingual Obfuscation [PDF]
Program obfuscation is an important software protection technique that prevents attackers from revealing the programming logic and design of the software. We introduce translingual obfuscation, a new software obfuscation scheme which makes programs obscure by "misusing" the unique features of certain programming languages.
Pei Wang 0007 +4 more
openaire +2 more sources
InfoScrub: Towards Attribute Privacy by Targeted Obfuscation [PDF]
Personal photos of individuals when shared online, apart from exhibiting a myriad of memorable details, also reveals a wide range of private information and potentially entails privacy risks (e.g., online harassment, tracking). To mitigate such risks, it
Fritz, Mario +2 more
core +2 more sources

