Results 31 to 40 of about 49,336 (256)

Design Protection Using Logic Encryption and Scan-Chain Obfuscation Techniques [PDF]

open access: yesInternational Journal of Electronics and Telecommunications, 2019
Due to increase in threats posed by offshore foundries, the companies outsourcing IPs are forced to protect their designs from the threats posed by the foundries. Few of the threats are IP piracy, counterfeiting and reverse engineering. To overcome these,
V.A. Deepak   +2 more
doaj   +1 more source

Partial Evaluation of String Obfuscations for Java Malware Detection [PDF]

open access: yes, 2016
The fact that Java is platform independent gives hackers the opportunity to write exploits that can target users on any platform, which has a JVM implementation. Metasploit is a well-known source of Javaexploits and to circumvent detection by Anti Virus (
Chawdhary, Aziem   +2 more
core   +1 more source

Research on construction of conditional exception code used in branch obfuscation

open access: yes网络与信息安全学报, 2020
Using conditional exception code construction and exception handler to replace conditional jump code,the branch obfuscation get the right branch selection,but the address of branch point was concealed,so this obfuscation method can defeat symbolic ...
Pu GENG, Yuefei ZHU
doaj   +3 more sources

Evaluation of Noise Distributions for Additive and Multiplicative Smart Meter Data Obfuscation

open access: yesIEEE Access, 2022
In this paper, we compare and analyze light-weight approaches for instantaneous smart meter (SM) data obfuscation from a group of consumers. In the literature, the common approach is to use additive Gaussian noise based SM data obfuscation.
Ahmed S. Khwaja   +3 more
doaj   +1 more source

You are your Metadata: Identification and Obfuscation of Social Media Users using Metadata Information [PDF]

open access: yes, 2018
Metadata are associated to most of the information we produce in our daily interactions and communication in the digital world. Yet, surprisingly, metadata are often still catergorized as non-sensitive.
Musolesi, Mirco   +2 more
core   +2 more sources

Trust and obfuscation principles for quality of information in emerging pervasive environments [PDF]

open access: yes, 2012
Non peer ...
Bisdikian, Chatschik   +3 more
core   +1 more source

Program obfuscation

open access: yesProceedings of the 2007 ACM workshop on Quality of protection, 2007
Despite the recent advances in the theory underlying obfuscation, there still is a need to evaluate the quality of practical obfuscating transformations more quickly and easily. This paper presents the first steps toward a comprehensive evaluation suite consisting of a number of deobfuscating transformations and complexity metrics that can be readily ...
Anckaert, Bertrand   +5 more
openaire   +2 more sources

Privacy Games: Optimal User-Centric Data Obfuscation

open access: yes, 2015
In this paper, we design user-centric obfuscation mechanisms that impose the minimum utility loss for guaranteeing user's privacy. We optimize utility subject to a joint guarantee of differential privacy (indistinguishability) and distortion privacy ...
Shokri, Reza
core   +2 more sources

Hybrid Obfuscation Using Signals and Encryption

open access: yesJournal of Computer Networks and Communications, 2018
Obfuscation of software and data is one of the subcategories of software security. Hence, the outlines of the obfuscation problem and its various methods have been studied in this article.
Bahare Hashemzade, Ali Maroosi
doaj   +1 more source

Achieving Obfuscation Through Self-Modifying Code: A Theoretical Model [PDF]

open access: yes, 2020
With the extreme amount of data and software available on networks, the protection of online information is one of the most important tasks of this technological age.
Waddell, Heidi
core   +1 more source

Home - About - Disclaimer - Privacy