Deobfuscation: Reverse Engineering Obfuscated Code [PDF]
In recent years, code obfuscation has attracted attention as a low cost approach to improving software security by making it difficult for attackers to understand the inner workings of proprietary software systems. This paper examines techniques for automatic deobfuscation of obfuscated programs, as a step towards reverse engineering such programs. Our
S.K. Udupa, S.K. Debray, M. Madou
openaire +1 more source
Reversible Codes in
Reversible codes play an essential role in coding theory because of their structural symmetry and broad applications in error control, cryptography, and DNA computing.
Bodigiri Sai Gopinadh, Venkatrajam Marka
doaj +1 more source
On Reversibility and Self-Duality for Some Classes of Quasi-Cyclic Codes
In this work, we study two classes of quasi-cyclic (QC) codes and examine how several properties can be combined into the codes of these classes. We start with the class of QC codes generated by diagonal generator polynomial matrices; a QC code in this ...
Ramy Taki Eldin, Hajime Matsui
doaj +1 more source
Experimental results for the Poincar\'e center problem (including an Appendix with Martin Cremer)
We apply a heuristic method based on counting points over finite fields to the Poincar\'e center problem. We show that this method gives the correct results for homogeneous non linearities of degree 2 and 3.
Bothmer, Hans-Christian Graf v.
core +1 more source
On the origin of the mitochondrial genetic code: Towards a unified mathematical framework for the management of genetic information [PDF]
The origin of the genetic code represents one of the most challenging problems in molecular evolution. The genetic code is an important universal feature of extant organisms and indicates a common ancestry of different forms of life on earth.
Diego Luis Gonzalez +2 more
core +2 more sources
PERSYMMETRIC MATRIX AND ITS APPLICATION IN CODING THEORY
A persymmetric matrix is a square matrix that is symmetric concerning its antidiagonal. This article discusses some characteristics of a persymmetric matrix and its application in coding theory. A persymmetric matrix is used to form a generator matrix of
Ardi Nur Hidayat +2 more
doaj +1 more source
Studying Acetylation of Aconitase Isozymes by Genetic Code Expansion
Aconitase catalyzes the second reaction of the tricarboxylic acid cycle, the reversible conversion of citrate and isocitrate. Escherichia coli has two isoforms of aconitase, AcnA and AcnB. Acetylomic studies have identified acetylation at multiple lysine
Jessica Araujo +5 more
doaj +1 more source
A NOVEL REVERSIBLE FAULT TOLERANT MICROPROCESSOR DESIGN IN AMS 0.35UM PROCESS
In this study, reversible circuits are revisited to achieve extreme soft-defect awareness in classical CMOS circuits. Defect models in the literature are reviewed and defect scattering is analyzed.
M. Hüsrev CILASUN, Mustafa ALTUN
doaj +2 more sources
Two-Layer Reversible Data Hiding Based on AMBTC Image With (7, 4) Hamming Code
In Malik et al.'s method, each pixel can be embedded with log23 bits by being modified at most 1. Thus, their method achieves significant hiding capacity while maintaining good visual quality. However, in their method, the first lower and the first upper
Juan Lin +4 more
doaj +1 more source
Reversible Data Hiding in Encrypted Image Based on (7, 4) Hamming Code and UnitSmooth Detection
With the development of cloud storage and privacy protection, reversible data hiding in encrypted images (RDHEI) plays the dual role of privacy protection and secret information transmission. RDHEI has a good application prospect and practical value. The
Lin Li, Chin-Chen Chang, Chia-Chen Lin
doaj +1 more source

