Results 221 to 230 of about 50,028 (274)
Hybrid deep learning model for accurate and efficient android malware detection using DBN-GRU. [PDF]
Kauser Sk H, Anu V M.
europepmc +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
ACM Transactions on Computer Systems, 2010
Proactive obfuscation is a new method for creating server replicas that are likely to have fewer shared vulnerabilities. It uses semantics-preserving code transformations to generate diverse executables, periodically restarting servers with these fresh versions.
Roeder, Tom, Schneider, Fred B.
openaire +1 more source
Proactive obfuscation is a new method for creating server replicas that are likely to have fewer shared vulnerabilities. It uses semantics-preserving code transformations to generate diverse executables, periodically restarting servers with these fresh versions.
Roeder, Tom, Schneider, Fred B.
openaire +1 more source
Data Flow Obfuscation: A New Paradigm for Obfuscating Circuits
IEEE Transactions on Very Large Scale Integration (VLSI) Systems, 2021In this article, unlike almost all state-of-the-art obfuscation solutions that focus on functional/logic obfuscation, we introduce a new paradigm, called data flow obfuscation, which exploits the essence of asynchronicity. In data flow obfuscation, by benefiting from the handshaking mechanism of asynchronous circuits, the system’s FFs/latches will ...
Kimia Zamiri Azar +5 more
openaire +1 more source
2004
Code obfuscations are semantics-preserving code transfor- mations used to protect a program from reverse engineering. There is gen- erally no expectation of complete, long-term, protection. Rather, there is a trade-off between the protection afforded by an obfuscation (i.e.
Kelly Heffner, Christian S. Collberg
openaire +1 more source
Code obfuscations are semantics-preserving code transfor- mations used to protect a program from reverse engineering. There is gen- erally no expectation of complete, long-term, protection. Rather, there is a trade-off between the protection afforded by an obfuscation (i.e.
Kelly Heffner, Christian S. Collberg
openaire +1 more source

