Results 21 to 30 of about 49,336 (256)

Securely Obfuscating Re-encryption [PDF]

open access: yesJournal of Cryptology, 2007
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Hohenberger, Susan   +3 more
openaire   +1 more source

Understanding Android Obfuscation Techniques: A Large-Scale Investigation in the Wild [PDF]

open access: yes, 2018
In this paper, we seek to better understand Android obfuscation and depict a holistic view of the usage of obfuscation through a large-scale investigation in the wild.
Chen, Kai   +9 more
core   +2 more sources

The current state of art in program obfuscations:definitions of obfuscation security

open access: yesТруды Института системного программирования РАН, 2018
Program obfuscation is a semantic-preserving transformation aimed at bringing a program into such a form, which impedes the understanding of its algorithm and data structures or prevents extracting of some valuable information from the text of a program.
N. P. Varnovsky   +3 more
doaj   +1 more source

ReTrustFSM: Toward RTL Hardware Obfuscation-A Hybrid FSM Approach

open access: yesIEEE Access, 2023
Hardware obfuscating is a proactive design-for-trust technique against IC supply chain threats, i.e., IP piracy and overproduction. Many studies have evaluated numerous techniques for obfuscation purposes.
M. Sazadur Rahman   +5 more
doaj   +1 more source

Partial-indistinguishability obfuscation using braids [PDF]

open access: yes, 2014
An obfuscator is an algorithm that translates circuits into functionally-equivalent similarly-sized circuits that are hard to understand. Efficient obfuscators would have many applications in cryptography.
Alagic, Gorjan   +2 more
core   +2 more sources

OPriv: Optimizing Privacy Protection for Network Traffic

open access: yesJournal of Sensor and Actuator Networks, 2021
Statistical traffic analysis has absolutely exposed the privacy of supposedly secure network traffic, proving that encryption is not effective anymore.
Louma Chaddad, Ali Chehab, Ayman Kayssi
doaj   +1 more source

Obfuscation-based malware update: A comparison of manual and automated methods [PDF]

open access: yes, 2017
Indexación: Scopus; Web of Science.This research presents a proposal of malware classification and its update based on capacity and obfuscation. This article is an extension of [4]a, and describes the procedure for malware updating, that is, to take ...
Barría, C.   +4 more
core   +2 more sources

Building a best-in-class automated de-identification tool for electronic health records through ensemble learning

open access: yesPatterns, 2021
Summary: The presence of personally identifiable information (PII) in natural language portions of electronic health records (EHRs) constrains their broad reuse.
Karthik Murugadoss   +10 more
doaj   +1 more source

PowerDrive: Accurate De-Obfuscation and Analysis of PowerShell Malware [PDF]

open access: yes, 2019
PowerShell is nowadays a widely-used technology to administrate and manage Windows-based operating systems. However, it is also extensively used by malware vectors to execute payloads or drop additional malicious contents.
Cara, Fabrizio   +3 more
core   +2 more sources

Obfuscating with transparency [PDF]

open access: yesScience, 2018
Transparency is critical when it comes to decision-making that broadly affects the public, particularly when it comes to policies purported to be grounded in scientific evidence. The scientific community has been increasingly focused on improving the transparency of research through initiatives that represent good-faith efforts to enhance the ...
openaire   +2 more sources

Home - About - Disclaimer - Privacy