Results 141 to 150 of about 189,996 (174)
Some of the next articles are maybe not open access.

Quantum Obfuscation: Quantum Predicates with Entangled qubits

Conference on Data and Application Security and Privacy, 2021
In this paper we discuss developing opaque predicates with the help of quantum entangled qubits. These opaque predicates obfuscate classical control flow in hybrid quantum-classical systems.
Vivek Balachandran
semanticscholar   +1 more source

STAMP morphs, prefix conjugations and multiverb predicates in the Chadic languages

Afrika und Übersee
STAMP morphs, prefix conjugations and the multiverb predicate subtype called auxiliary verb constructions (AVCs) that these derive from in the Chadic languages are discussed.
Gregory D. S. Anderson
semanticscholar   +1 more source

Quantificational DP arguments of opaque predicates in German

2019
This thesis explores two aspects of the semantics of German sentences like (i), in which opaque predicates combine with DP arguments. Three classes of opaque predicates are considered: proposition-embedding predicates (i-a), question-embedding predicates (i-b) and intensional transitive verbs, which have been argued to take property arguments (i-c). (i)
openaire   +1 more source

ObfusQate: Unveiling the First Quantum Program Obfuscation Framework

Checkmate@CCS
We introduce ObfusQate, a novel framework that performs software obfuscation using quantum primitives to enhance the security of both classical and quantum programs. ObfusQate implements eight obfuscation techniques categorized into quantum circuit-level
Nikhil Bartake   +5 more
semanticscholar   +1 more source

Xpose: Bi-directional Engineering for Hidden Query Extraction

arXiv.org
Query reverse engineering (QRE) aims to synthesize a SQL query to connect a given database and result instance. A recent variation of QRE is where an additional input, an opaque executable containing a ground-truth query, is provided, and the goal is to ...
Ahana Pradhan, J. Haritsa
semanticscholar   +1 more source

LLMs are Frequency Pattern Learners in Natural Language Inference

arXiv.org
While fine-tuning LLMs on NLI corpora improves their inferential performance, the underlying mechanisms driving this improvement remain largely opaque. In this work, we conduct a series of experiments to investigate what LLMs actually learn during fine ...
Liang Cheng, Zhaowei Wang, Mark Steedman
semanticscholar   +1 more source

Can LLMs Recover Program Semantics? A Systematic Evaluation with Symbolic Execution

arXiv.org
Obfuscation poses a persistent challenge for software engineering tasks such as program comprehension, maintenance, testing, and vulnerability detection.
Rong Feng, Suman Saha
semanticscholar   +1 more source

Honeypot-Driven Decoy Block Vulnerability Obfuscation: A Structured Framework for Software Protection Against Symbolic Execution Attacks

2025 4th International Symposium on Computer Applications and Information Technology (ISCAIT)
Symbolic execution, a powerful program analysis technique, poses a significant threat to software security by efficiently exploring program paths and exposing vulnerabilities.
Zhizhuang Zhou
semanticscholar   +1 more source

Assessing the Effectiveness of the Tigress Obfuscator Against MOPSA and BinaryNinja

Checkmate@CCS
We present an empirical evaluation of the Tigress obfuscator, focusing on its ability to degrade the precision of static analyses performed by two state-of-the-art tools: mopsa, a source-level static analyzer, and BinaryNinja a binary-level decompiler ...
Nicolò Altamura   +3 more
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy