Results 21 to 30 of about 49,594 (257)
The current state of art in program obfuscations:definitions of obfuscation security
Program obfuscation is a semantic-preserving transformation aimed at bringing a program into such a form, which impedes the understanding of its algorithm and data structures or prevents extracting of some valuable information from the text of a program.
N. P. Varnovsky +3 more
doaj +1 more source
OPriv: Optimizing Privacy Protection for Network Traffic
Statistical traffic analysis has absolutely exposed the privacy of supposedly secure network traffic, proving that encryption is not effective anymore.
Louma Chaddad, Ali Chehab, Ayman Kayssi
doaj +1 more source
Partial-indistinguishability obfuscation using braids [PDF]
An obfuscator is an algorithm that translates circuits into functionally-equivalent similarly-sized circuits that are hard to understand. Efficient obfuscators would have many applications in cryptography.
Alagic, Gorjan +2 more
core +2 more sources
Summary: The presence of personally identifiable information (PII) in natural language portions of electronic health records (EHRs) constrains their broad reuse.
Karthik Murugadoss +10 more
doaj +1 more source
Obfuscation-based malware update: A comparison of manual and automated methods [PDF]
Indexación: Scopus; Web of Science.This research presents a proposal of malware classification and its update based on capacity and obfuscation. This article is an extension of [4]a, and describes the procedure for malware updating, that is, to take ...
Barría, C. +4 more
core +2 more sources
PowerDrive: Accurate De-Obfuscation and Analysis of PowerShell Malware [PDF]
PowerShell is nowadays a widely-used technology to administrate and manage Windows-based operating systems. However, it is also extensively used by malware vectors to execute payloads or drop additional malicious contents.
Cara, Fabrizio +3 more
core +2 more sources
Design Protection Using Logic Encryption and Scan-Chain Obfuscation Techniques [PDF]
Due to increase in threats posed by offshore foundries, the companies outsourcing IPs are forced to protect their designs from the threats posed by the foundries. Few of the threats are IP piracy, counterfeiting and reverse engineering. To overcome these,
V.A. Deepak +2 more
doaj +1 more source
ReTrustFSM: Toward RTL Hardware Obfuscation-A Hybrid FSM Approach
Hardware obfuscating is a proactive design-for-trust technique against IC supply chain threats, i.e., IP piracy and overproduction. Many studies have evaluated numerous techniques for obfuscation purposes.
M. Sazadur Rahman +5 more
doaj +1 more source
Obfuscating with transparency [PDF]
Transparency is critical when it comes to decision-making that broadly affects the public, particularly when it comes to policies purported to be grounded in scientific evidence. The scientific community has been increasingly focused on improving the transparency of research through initiatives that represent good-faith efforts to enhance the ...
openaire +2 more sources
Evaluation of Noise Distributions for Additive and Multiplicative Smart Meter Data Obfuscation
In this paper, we compare and analyze light-weight approaches for instantaneous smart meter (SM) data obfuscation from a group of consumers. In the literature, the common approach is to use additive Gaussian noise based SM data obfuscation.
Ahmed S. Khwaja +3 more
doaj +1 more source

