Results 101 to 110 of about 238 (139)
Disintegration at the Syntax-Semantics Interface in Prodromal Alzheimer's Disease: New Evidence from Complex Sentence Anaphora in Amnestic Mild Cognitive Impairment (aMCI). [PDF]
Lust B +4 more
europepmc +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
Zero Footprint Opaque Predicates: Synthesizing Opaque Predicates from Naturally Occurring Invariants
2021A popular control-flow obfuscation approach used to protect software is inserting opaque predicates. However, recent research has questioned the usefulness of opaque predicates with the realization that simple heuristic attacks can effectively detect them.
Yu-Jye Tung, Ian G. Harris
openaire +1 more source
When are Opaque Predicates Useful?
2019 18th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/13th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE), 2019Opaque predicates are a commonly used technique in program obfuscation, intended to add complexity to control flow and to insert dummy code or watermarks. However, there are many attacks known to detect opaque predicates and remove dummy code. We survey these attacks and argue that many types of programs cannot be securely obfuscated using opaque ...
Lukas Zobernig +2 more
openaire +1 more source
Constructing Opaque Predicates for Java Programs
2006 International Conference on Computational Intelligence and Security, 2006This paper proposes a new method to construct a family of opaque predicates for Java programs by combining indeterminate equation and cryptography. In our construction, cryptography is first exploited for manufacturing opaque predicates. Our opaque predicates are more resilient, stealthier and cheaper.
Zheng Yuan, Qiaoyan Wen, Ming Mao
openaire +1 more source
Manufacturing Resilient Bi-Opaque Predicates Against Symbolic Execution
2018 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), 2018Control-flow obfuscation increases program complexity by semantic-preserving transformation. Opaque predicates are essential gadgets to achieve such transformation. However, we observe that real-world opaque predicates are generally very simple and engage little security consideration.
Hui Xu +4 more
openaire +1 more source
Software watermarking via opaque predicates: Implementation, analysis, and attacks
Electronic Commerce Research, 2006Within the software industry software piracy is a great concern. In this article we address this issue through a prevention technique called software watermarking. Depending on how a software watermark is applied it can be used to discourage piracy; as proof of authorship or purchase; or to track the source of the illegal redistribution.
Ginger Myles, Christian Collberg
openaire +1 more source
The Research of Multi-point Function Opaque Predicates Obfuscation Algorithm
Applied Mathematics & Information Sciences, 2014On the algorithm of code obfuscation, opaque predicate is used to confuse the judgment of the program branches to achieve complex control flow statement. Currently, there are problems o f obfuscation on the opaque predicate. The first problem is the isolation.
YANG Yubo +4 more
openaire +1 more source
Opaque Predicate Detection by Static Analysis of Binary Executables
2017Opaque Predicates are one of the most covert methods employed by obfuscators to mitigate the risk of reverse engineering of code. Detecting the presence of opaque predicates in a program is an arduous problem since, it is challenging to differentiate between the conditional expressions present in the program and the extraneous expressions added by the ...
R. Krishna Ram Prakash +2 more
openaire +1 more source
Securing Mobile Agents Control Flow Using Opaque Predicates
2005Mobile agent technology is an evolving paradigm that combines the inherent characteristics of intelligent agents, namely, adaptability, reactivity and autonomy with mobility. These characteristics of mobile agents provide an excellent means of meeting the distributed and heterogeneous requirements for many electronic commerce applications involving low
Anirban Majumdar, Clark Thomborson
openaire +1 more source
2017 International Conference on Progress in Informatics and Computing (PIC), 2017
In order to enhance the white box security of software, we proposed a reduplicate code obfuscation algorithm to protect the source code. Firstly, we apply the parameter decomposition tree to formalize the code, and then we utilize flattening control flow system to decompose the source code into a multi-branch WHILE-SWITCH loop structure.
Zheheng Liang +4 more
openaire +1 more source
In order to enhance the white box security of software, we proposed a reduplicate code obfuscation algorithm to protect the source code. Firstly, we apply the parameter decomposition tree to formalize the code, and then we utilize flattening control flow system to decompose the source code into a multi-branch WHILE-SWITCH loop structure.
Zheheng Liang +4 more
openaire +1 more source

