Results 41 to 50 of about 50,028 (274)

On Best-Possible Obfuscation [PDF]

open access: yesJournal of Cryptology, 2007
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Goldwasser, Shafrira, Rothblum, Guy N.
openaire   +6 more sources

Partial Evaluation of String Obfuscations for Java Malware Detection [PDF]

open access: yes, 2016
The fact that Java is platform independent gives hackers the opportunity to write exploits that can target users on any platform, which has a JVM implementation. Metasploit is a well-known source of Javaexploits and to circumvent detection by Anti Virus (
Chawdhary, Aziem   +2 more
core   +1 more source

Research on deception defense techniques based on network characteristics obfuscation

open access: yes网络与信息安全学报, 2021
There is usually a reconnaissance stage before a network attack, the attacker obtains the key information of the target system through techniques such as traffic analysis and active scanning, to formulate a targeted network attack.
ZHAO Jinlong, ZHANG Guomin, XING Changyou
doaj   +3 more sources

Hybrid Obfuscation Using Signals and Encryption

open access: yesJournal of Computer Networks and Communications, 2018
Obfuscation of software and data is one of the subcategories of software security. Hence, the outlines of the obfuscation problem and its various methods have been studied in this article.
Bahare Hashemzade, Ali Maroosi
doaj   +1 more source

Privacy Games: Optimal User-Centric Data Obfuscation

open access: yes, 2015
In this paper, we design user-centric obfuscation mechanisms that impose the minimum utility loss for guaranteeing user's privacy. We optimize utility subject to a joint guarantee of differential privacy (indistinguishability) and distortion privacy ...
Shokri, Reza
core   +2 more sources

Research on the Construction of Malware Variant Datasets and Their Detection Method

open access: yesApplied Sciences, 2022
Malware detection is of great significance for maintaining the security of information systems. Malware obfuscation techniques and malware variants are increasingly emerging, but their samples and API (application programming interface) sequences are ...
Faming Lu   +4 more
doaj   +1 more source

Achieving Obfuscation Through Self-Modifying Code: A Theoretical Model [PDF]

open access: yes, 2020
With the extreme amount of data and software available on networks, the protection of online information is one of the most important tasks of this technological age.
Waddell, Heidi
core   +1 more source

Non-malleable Obfuscation [PDF]

open access: yes, 2009
Existing definitions of program obfuscation do not rule out malleability attacks, where an adversary that sees an obfuscated program is able to generate another (potentially obfuscated) program that is related to the original one in some way. We formulate two natural flavors of non-malleability requirements for program obfuscation, and show that ...
Ran Canetti, Mayank Varia
openaire   +2 more sources

Quantum Obfuscation of Generalized Quantum Power Functions with Coefficient

open access: yesEntropy, 2023
Quantum obfuscation is one of the important primitives in quantum cryptography that can be used to enhance the security of various quantum cryptographic schemes.
Yazhuo Jiang   +3 more
doaj   +1 more source

Obfuscation and Rational Inattention*

open access: yesThe Journal of Industrial Economics, 2023
We study the behavior of duopolistic firms that can obfuscate their prices before competing on price. Obfuscation affects the rational inattentive consumers' optimal information strategy, which determines the probabilistic demand. Our model advances related models by allowing consumers to update their unrestricted prior beliefs with an informative ...
Aljoscha Janssen, Johannes Kasinger
openaire   +2 more sources

Home - About - Disclaimer - Privacy