Results 121 to 130 of about 189,996 (174)
Semantic units: organizing knowledge graphs into semantically meaningful units of representation. [PDF]
Vogt L, Kuhn T, Hoehndorf R.
europepmc +1 more source
Naturalism and the hard problem of mysticism in psychedelic science. [PDF]
JylkkÀ J.
europepmc +1 more source
Disintegration at the Syntax-Semantics Interface in Prodromal Alzheimer's Disease: New Evidence from Complex Sentence Anaphora in Amnestic Mild Cognitive Impairment (aMCI). [PDF]
Lust B +4 more
europepmc +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
Zero Footprint Opaque Predicates: Synthesizing Opaque Predicates from Naturally Occurring Invariants
International Conference on Detection of intrusions and malware, and vulnerability assessment, 2021A popular control-flow obfuscation approach used to protect software is inserting opaque predicates. However, recent research has questioned the usefulness of opaque predicates with the realization that simple heuristic attacks can effectively detect them.
Yu-Jye Tung, Ian G. Harris
openaire +2 more sources
When are Opaque Predicates Useful?
2019 18th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/13th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE), 2019Opaque predicates are a commonly used technique in program obfuscation, intended to add complexity to control flow and to insert dummy code or watermarks. However, there are many attacks known to detect opaque predicates and remove dummy code. We survey these attacks and argue that many types of programs cannot be securely obfuscated using opaque ...
Lukas Zobernig +2 more
openaire +2 more sources
Assessing Opaque Predicates: Unveiling the Efficacy of Popular Obfuscators with a Rapid Deobfuscator
2023 30th Asia-Pacific Software Engineering Conference (APSEC), 2023Program obfuscation protects a program's intellectual property rights and vulnerabilities by making it unreadable and hardening program analysis. However, obfuscation typically adds size and complexity to programs, resulting in performance overhead ...
Hyeongchang Jeon +3 more
openaire +2 more sources
Manufacturing Resilient Bi-Opaque Predicates Against Symbolic Execution
2018 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), 2018Control-flow obfuscation increases program complexity by semantic-preserving transformation. Opaque predicates are essential gadgets to achieve such transformation. However, we observe that real-world opaque predicates are generally very simple and engage little security consideration.
Hui Xu +4 more
openaire +2 more sources
Constructing Opaque Predicates for Java Programs
2006 International Conference on Computational Intelligence and Security, 2006This paper proposes a new method to construct a family of opaque predicates for Java programs by combining indeterminate equation and cryptography. In our construction, cryptography is first exploited for manufacturing opaque predicates. Our opaque predicates are more resilient, stealthier and cheaper.
Zheng Yuan, Qiaoyan Wen, Ming Mao
openaire +2 more sources

