Results 31 to 40 of about 50,028 (274)
Obfuscation for Cryptographic Purposes [PDF]
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Hofheinz, D., Malone-Lee, J., Stam, M.
openaire +4 more sources
Encryption of data is fundamental to secure communication in the modern world. Beyond encryption of data lies obfuscation, i.e., encryption of functionality. It is well-known that the most powerful means of obfuscating classical programs, so-called ``black-box obfuscation',' is provably impossible [Barak et al '12]. However, several recent results have
Gorjan Alagic, Bill Fefferman
openaire +2 more sources
Obfuscating with transparency [PDF]
Transparency is critical when it comes to decision-making that broadly affects the public, particularly when it comes to policies purported to be grounded in scientific evidence. The scientific community has been increasingly focused on improving the transparency of research through initiatives that represent good-faith efforts to enhance the ...
openaire +2 more sources
Understanding Obfuscated Code [PDF]
Code obfuscation makes it harder for a security analyst to understand the malicious payload of a program. In most cases an analyst needs to study the program at the machine code level, with little or no extra information available, apart from his experience.
Madou, Matias +2 more
openaire +2 more sources
PowerDrive: Accurate De-Obfuscation and Analysis of PowerShell Malware [PDF]
PowerShell is nowadays a widely-used technology to administrate and manage Windows-based operating systems. However, it is also extensively used by malware vectors to execute payloads or drop additional malicious contents.
Cara, Fabrizio +3 more
core +2 more sources
On Extractability Obfuscation [PDF]
We initiate the study of extractability obfuscation, a notion first suggested by Barak et al. (JACM 2012): An extractability obfuscator \(e{\mathcal{O}}\) for a class of algorithms \(\mathcal{M}\) guarantees that if an efficient attacker \(\mathcal{A}\) can distinguish between obfuscations \(e{\mathcal O}(M_1), e{\mathcal O}(M_2)\) of two algorithms ...
Elette Boyle, Kai-Min Chung, Rafael Pass
openaire +2 more sources
Obfuscation-based malware update: A comparison of manual and automated methods [PDF]
Indexación: Scopus; Web of Science.This research presents a proposal of malware classification and its update based on capacity and obfuscation. This article is an extension of [4]a, and describes the procedure for malware updating, that is, to take ...
Barría, C. +4 more
core +2 more sources
Evaluation of Noise Distributions for Additive and Multiplicative Smart Meter Data Obfuscation
In this paper, we compare and analyze light-weight approaches for instantaneous smart meter (SM) data obfuscation from a group of consumers. In the literature, the common approach is to use additive Gaussian noise based SM data obfuscation.
Ahmed S. Khwaja +3 more
doaj +1 more source
Style Obfuscation by Invariance [PDF]
The task of obfuscating writing style using sequence models has previously been investigated under the framework of obfuscation-by-transfer, where the input text is explicitly rewritten in another style. These approaches also often lead to major alterations to the semantic content of the input.
Emmery, C. +2 more
openaire +4 more sources
Protecting Private Attributes in App Based Mobile User Profiling
The Analytics companies enable successful targeted advertising via user profiles, derived from the mobile apps installed by specific users, and hence have become an integral part of the mobile advertising industry. This threatens the users' privacy, when
Imdad Ullah +5 more
doaj +1 more source

