Results 231 to 240 of about 30,050 (262)
Some of the next articles are maybe not open access.

Data Obfuscation Technique in Cloud Security

2021 2nd International Conference on Smart Electronics and Communication (ICOSEC), 2021
Cloud storage, in general, is a collection of Computer Technology resources provided to consumers over the internet on a leased basis. Cloud storage has several advantages, including simplicity, reliability, scalability, convergence, and cost savings. One of the most significant impediments to cloud computing's growth is security. This paper proposes a
Vamsidhar Enireddy   +5 more
openaire   +1 more source

Attacks on Logic Locking Obfuscation Techniques

2021 IEEE International Conference on Consumer Electronics (ICCE), 2021
Logic Locking is a relatively new obfuscation technique that is at the forefront of preventing IP theft, piracy, overproduction, and counterfeiting of chips made in contracted foundries. As logic locking develops and new gate insertion techniques are created, their resilience to attacks must be evaluated to know their true effectiveness. In this paper,
Jake Mellor   +3 more
openaire   +1 more source

Code obfuscation techniques for metamorphic viruses

Journal in Computer Virology, 2008
This paper deals with metamorphic viruses. More precisely, it examines the use of advanced code obfuscation techniques with respect to metamorphic viruses. Our objective is to evaluate the difficulty of a reliable static detection of viruses that use such obfuscation techniques. Here we extend Spinellis’ result (IEEE Trans. Inform.
Borello, J.-M., Mé, Ludovic
openaire   +2 more sources

Digital evidence obfuscation: recovery techniques

SPIE Proceedings, 2005
Criminals who use computers to commit crimes often hide the fruits of the commission of those crimes. Hiding files on a computer can take on many forms, from file names and extensions to more technical methods such as encryption and steganography. Encryption and steganography have the potential to severely impede the recovery of digital evidence.
Craiger, J. Philip   +2 more
openaire   +2 more sources

Split-fabrication obfuscation: Metrics and techniques

2014 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST), 2014
Split-fabrication has been proposed as an approach for secure and trusted access to advanced microelectronics manufacturing capability using un-trusted sources. Each wafer to be manufactured is processed by two semiconductor foundries, combining the front-end capabilities of an advanced but untrusted semiconductor foundry with the back-end capabilities
Meenatchi Jagasivamani   +4 more
openaire   +1 more source

Advanced obfuscation techniques for Java bytecode

Journal of Systems and Software, 2004
There exist several obfuscation tools for preventing Java bytecode from being decompiled. Most of these tools, simply scramble the names of the identifiers stored in a bytecode by substituting the identifiers with meaningless names. However, the scrambling technique cannot deter a determined cracker very long.
Jien-Tsai Chan, Wuu Yang
openaire   +1 more source

Malware Obfuscation Techniques: A Brief Survey

2010 International Conference on Broadband, Wireless Computing, Communication and Applications, 2010
As the obfuscation is widely used by malware writers to evade antivirus scanners, so it becomes important to analyze how this technique is applied to malwares. This paper explores the malware obfuscation techniques while reviewing the encrypted, oligomorphic, polymorphic and metamorphic malwares which are able to avoid detection.
Ilsun You, Kangbin Yim
openaire   +1 more source

New Techniques for Obfuscating Conjunctions

2019
A conjunction is a function \(f(x_1,\dots ,x_n) = \bigwedge _{i \in S} l_i\) where \(S \subseteq [n]\) and each \(l_i\) is \(x_i\) or \(\lnot x_i\). Bishop et al. (CRYPTO 2018) recently proposed obfuscating conjunctions by embedding them in the error positions of a noisy Reed-Solomon codeword and placing the codeword in a group exponent.
James Bartusek   +3 more
openaire   +1 more source

Eavesdropping and obfuscation techniques for smartphones

Proceedings of the International Conference on Mobile Software Engineering and Systems, 2016
Mobile apps often collect and share personal data with untrustworthy third-party apps, which may lead to data misuse and privacy violations. Most of the collected data originates from sensors built into the mobile device, where some of the sensors are treated as sensitive by the mobile platform while others permit unconditional access.
Supriyo Chakraborty, Omer Tripp
openaire   +1 more source

Hardware Obfuscation Techniques on FPGA-Based Systems

2020 IEEE East-West Design & Test Symposium (EWDTS), 2020
There is a great variety of hardware Trojan detection and prevention approaches. However, state of art approaches cannot provide a full guarantee that an integrated circuit or complex electronic system is free of hardware Trojan. We introduced a reference monitor obfuscation approach on the base of formal transformations of structural system models ...
Valeriy Gorbachov   +3 more
openaire   +1 more source

Home - About - Disclaimer - Privacy