Results 141 to 150 of about 189,996 (174)
Some of the next articles are maybe not open access.
Quantum Obfuscation: Quantum Predicates with Entangled qubits
Conference on Data and Application Security and Privacy, 2021In this paper we discuss developing opaque predicates with the help of quantum entangled qubits. These opaque predicates obfuscate classical control flow in hybrid quantum-classical systems.
Vivek Balachandran
semanticscholar +1 more source
STAMP morphs, prefix conjugations and multiverb predicates in the Chadic languages
Afrika und ÜberseeSTAMP morphs, prefix conjugations and the multiverb predicate subtype called auxiliary verb constructions (AVCs) that these derive from in the Chadic languages are discussed.
Gregory D. S. Anderson
semanticscholar +1 more source
Quantificational DP arguments of opaque predicates in German
2019This thesis explores two aspects of the semantics of German sentences like (i), in which opaque predicates combine with DP arguments. Three classes of opaque predicates are considered: proposition-embedding predicates (i-a), question-embedding predicates (i-b) and intensional transitive verbs, which have been argued to take property arguments (i-c). (i)
openaire +1 more source
ObfusQate: Unveiling the First Quantum Program Obfuscation Framework
Checkmate@CCSWe introduce ObfusQate, a novel framework that performs software obfuscation using quantum primitives to enhance the security of both classical and quantum programs. ObfusQate implements eight obfuscation techniques categorized into quantum circuit-level
Nikhil Bartake +5 more
semanticscholar +1 more source
Xpose: Bi-directional Engineering for Hidden Query Extraction
arXiv.orgQuery reverse engineering (QRE) aims to synthesize a SQL query to connect a given database and result instance. A recent variation of QRE is where an additional input, an opaque executable containing a ground-truth query, is provided, and the goal is to ...
Ahana Pradhan, J. Haritsa
semanticscholar +1 more source
LLMs are Frequency Pattern Learners in Natural Language Inference
arXiv.orgWhile fine-tuning LLMs on NLI corpora improves their inferential performance, the underlying mechanisms driving this improvement remain largely opaque. In this work, we conduct a series of experiments to investigate what LLMs actually learn during fine ...
Liang Cheng, Zhaowei Wang, Mark Steedman
semanticscholar +1 more source
Can LLMs Recover Program Semantics? A Systematic Evaluation with Symbolic Execution
arXiv.orgObfuscation poses a persistent challenge for software engineering tasks such as program comprehension, maintenance, testing, and vulnerability detection.
Rong Feng, Suman Saha
semanticscholar +1 more source
2025 4th International Symposium on Computer Applications and Information Technology (ISCAIT)
Symbolic execution, a powerful program analysis technique, poses a significant threat to software security by efficiently exploring program paths and exposing vulnerabilities.
Zhizhuang Zhou
semanticscholar +1 more source
Symbolic execution, a powerful program analysis technique, poses a significant threat to software security by efficiently exploring program paths and exposing vulnerabilities.
Zhizhuang Zhou
semanticscholar +1 more source
Assessing the Effectiveness of the Tigress Obfuscator Against MOPSA and BinaryNinja
Checkmate@CCSWe present an empirical evaluation of the Tigress obfuscator, focusing on its ability to degrade the precision of static analyses performed by two state-of-the-art tools: mopsa, a source-level static analyzer, and BinaryNinja a binary-level decompiler ...
Nicolò Altamura +3 more
semanticscholar +1 more source
Constructing Opaque Predicate Using Homomorphic Encryption
2022Yohsuke Hirano, Yasuhiro Ohtaki
openaire +1 more source

