Results 231 to 240 of about 30,050 (262)
Some of the next articles are maybe not open access.
Data Obfuscation Technique in Cloud Security
2021 2nd International Conference on Smart Electronics and Communication (ICOSEC), 2021Cloud storage, in general, is a collection of Computer Technology resources provided to consumers over the internet on a leased basis. Cloud storage has several advantages, including simplicity, reliability, scalability, convergence, and cost savings. One of the most significant impediments to cloud computing's growth is security. This paper proposes a
Vamsidhar Enireddy +5 more
openaire +1 more source
Attacks on Logic Locking Obfuscation Techniques
2021 IEEE International Conference on Consumer Electronics (ICCE), 2021Logic Locking is a relatively new obfuscation technique that is at the forefront of preventing IP theft, piracy, overproduction, and counterfeiting of chips made in contracted foundries. As logic locking develops and new gate insertion techniques are created, their resilience to attacks must be evaluated to know their true effectiveness. In this paper,
Jake Mellor +3 more
openaire +1 more source
Code obfuscation techniques for metamorphic viruses
Journal in Computer Virology, 2008This paper deals with metamorphic viruses. More precisely, it examines the use of advanced code obfuscation techniques with respect to metamorphic viruses. Our objective is to evaluate the difficulty of a reliable static detection of viruses that use such obfuscation techniques. Here we extend Spinellis’ result (IEEE Trans. Inform.
Borello, J.-M., Mé, Ludovic
openaire +2 more sources
Digital evidence obfuscation: recovery techniques
SPIE Proceedings, 2005Criminals who use computers to commit crimes often hide the fruits of the commission of those crimes. Hiding files on a computer can take on many forms, from file names and extensions to more technical methods such as encryption and steganography. Encryption and steganography have the potential to severely impede the recovery of digital evidence.
Craiger, J. Philip +2 more
openaire +2 more sources
Split-fabrication obfuscation: Metrics and techniques
2014 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST), 2014Split-fabrication has been proposed as an approach for secure and trusted access to advanced microelectronics manufacturing capability using un-trusted sources. Each wafer to be manufactured is processed by two semiconductor foundries, combining the front-end capabilities of an advanced but untrusted semiconductor foundry with the back-end capabilities
Meenatchi Jagasivamani +4 more
openaire +1 more source
Advanced obfuscation techniques for Java bytecode
Journal of Systems and Software, 2004There exist several obfuscation tools for preventing Java bytecode from being decompiled. Most of these tools, simply scramble the names of the identifiers stored in a bytecode by substituting the identifiers with meaningless names. However, the scrambling technique cannot deter a determined cracker very long.
Jien-Tsai Chan, Wuu Yang
openaire +1 more source
Malware Obfuscation Techniques: A Brief Survey
2010 International Conference on Broadband, Wireless Computing, Communication and Applications, 2010As the obfuscation is widely used by malware writers to evade antivirus scanners, so it becomes important to analyze how this technique is applied to malwares. This paper explores the malware obfuscation techniques while reviewing the encrypted, oligomorphic, polymorphic and metamorphic malwares which are able to avoid detection.
Ilsun You, Kangbin Yim
openaire +1 more source
New Techniques for Obfuscating Conjunctions
2019A conjunction is a function \(f(x_1,\dots ,x_n) = \bigwedge _{i \in S} l_i\) where \(S \subseteq [n]\) and each \(l_i\) is \(x_i\) or \(\lnot x_i\). Bishop et al. (CRYPTO 2018) recently proposed obfuscating conjunctions by embedding them in the error positions of a noisy Reed-Solomon codeword and placing the codeword in a group exponent.
James Bartusek +3 more
openaire +1 more source
Eavesdropping and obfuscation techniques for smartphones
Proceedings of the International Conference on Mobile Software Engineering and Systems, 2016Mobile apps often collect and share personal data with untrustworthy third-party apps, which may lead to data misuse and privacy violations. Most of the collected data originates from sensors built into the mobile device, where some of the sensors are treated as sensitive by the mobile platform while others permit unconditional access.
Supriyo Chakraborty, Omer Tripp
openaire +1 more source
Hardware Obfuscation Techniques on FPGA-Based Systems
2020 IEEE East-West Design & Test Symposium (EWDTS), 2020There is a great variety of hardware Trojan detection and prevention approaches. However, state of art approaches cannot provide a full guarantee that an integrated circuit or complex electronic system is free of hardware Trojan. We introduced a reference monitor obfuscation approach on the base of formal transformations of structural system models ...
Valeriy Gorbachov +3 more
openaire +1 more source

