Results 241 to 250 of about 50,028 (274)
Some of the next articles are maybe not open access.
Obfuscation from Polynomial Hardness: Beyond Decomposable Obfuscation
2018Every known construction of general indistinguishability obfuscation (\(\mathsf {i}\mathcal {O}\)) is either based on a family of exponentially many assumptions, or is based on a single assumption – e.g. functional encryption (\(\mathsf {FE}\)) – using a reduction that incurs an exponential loss in security.
Yuan Kang +3 more
openaire +2 more sources
Incremental Program Obfuscation
2017Recent advances in program obfuscation suggest that it is possible to create software that can provably safeguard secret information. However, software systems usually contain large executable code that is updated multiple times and sometimes very frequently.
Sanjam Garg, Omkant Pandey
openaire +2 more sources
On Obstructing Obscenity Obfuscation
ACM Transactions on the Web, 2017Obscenity (the use of rude words or offensive expressions) has spread from informal verbal conversations to digital media, becoming increasingly common on user-generated comments found in Web forums, newspaper user boards, social networks, blogs, and media-sharing sites.
openaire +1 more source
2017 IEEE 58th Annual Symposium on Foundations of Computer Science (FOCS), 2017
Rishab Goyal +2 more
openaire +2 more sources
Rishab Goyal +2 more
openaire +2 more sources
Measuring Software Obfuscation Quality–A Systematic Literature Review
IEEE Access, 2021Shouki A Ebad, Abdulbasit A Darem
exaly
Android malware obfuscation variants detection method based on multi-granularity opcode features
Future Generation Computer Systems, 2022Ruixuan Li, Yu Jiang
exaly

