Results 31 to 40 of about 50,028 (274)

Obfuscation for Cryptographic Purposes [PDF]

open access: yesJournal of Cryptology, 2007
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Hofheinz, D., Malone-Lee, J., Stam, M.
openaire   +4 more sources

On Quantum Obfuscation

open access: yesCoRR, 2016
Encryption of data is fundamental to secure communication in the modern world. Beyond encryption of data lies obfuscation, i.e., encryption of functionality. It is well-known that the most powerful means of obfuscating classical programs, so-called ``black-box obfuscation',' is provably impossible [Barak et al '12]. However, several recent results have
Gorjan Alagic, Bill Fefferman
openaire   +2 more sources

Obfuscating with transparency [PDF]

open access: yesScience, 2018
Transparency is critical when it comes to decision-making that broadly affects the public, particularly when it comes to policies purported to be grounded in scientific evidence. The scientific community has been increasingly focused on improving the transparency of research through initiatives that represent good-faith efforts to enhance the ...
openaire   +2 more sources

Understanding Obfuscated Code [PDF]

open access: yes14th IEEE International Conference on Program Comprehension (ICPC'06), 2006
Code obfuscation makes it harder for a security analyst to understand the malicious payload of a program. In most cases an analyst needs to study the program at the machine code level, with little or no extra information available, apart from his experience.
Madou, Matias   +2 more
openaire   +2 more sources

PowerDrive: Accurate De-Obfuscation and Analysis of PowerShell Malware [PDF]

open access: yes, 2019
PowerShell is nowadays a widely-used technology to administrate and manage Windows-based operating systems. However, it is also extensively used by malware vectors to execute payloads or drop additional malicious contents.
Cara, Fabrizio   +3 more
core   +2 more sources

On Extractability Obfuscation [PDF]

open access: yes, 2014
We initiate the study of extractability obfuscation, a notion first suggested by Barak et al. (JACM 2012): An extractability obfuscator \(e{\mathcal{O}}\) for a class of algorithms \(\mathcal{M}\) guarantees that if an efficient attacker \(\mathcal{A}\) can distinguish between obfuscations \(e{\mathcal O}(M_1), e{\mathcal O}(M_2)\) of two algorithms ...
Elette Boyle, Kai-Min Chung, Rafael Pass
openaire   +2 more sources

Obfuscation-based malware update: A comparison of manual and automated methods [PDF]

open access: yes, 2017
Indexación: Scopus; Web of Science.This research presents a proposal of malware classification and its update based on capacity and obfuscation. This article is an extension of [4]a, and describes the procedure for malware updating, that is, to take ...
Barría, C.   +4 more
core   +2 more sources

Evaluation of Noise Distributions for Additive and Multiplicative Smart Meter Data Obfuscation

open access: yesIEEE Access, 2022
In this paper, we compare and analyze light-weight approaches for instantaneous smart meter (SM) data obfuscation from a group of consumers. In the literature, the common approach is to use additive Gaussian noise based SM data obfuscation.
Ahmed S. Khwaja   +3 more
doaj   +1 more source

Style Obfuscation by Invariance [PDF]

open access: yesCoRR, 2018
The task of obfuscating writing style using sequence models has previously been investigated under the framework of obfuscation-by-transfer, where the input text is explicitly rewritten in another style. These approaches also often lead to major alterations to the semantic content of the input.
Emmery, C.   +2 more
openaire   +4 more sources

Protecting Private Attributes in App Based Mobile User Profiling

open access: yesIEEE Access, 2020
The Analytics companies enable successful targeted advertising via user profiles, derived from the mobile apps installed by specific users, and hence have become an integral part of the mobile advertising industry. This threatens the users' privacy, when
Imdad Ullah   +5 more
doaj   +1 more source

Home - About - Disclaimer - Privacy