Results 31 to 40 of about 19,819 (285)

CryptoKnight:generating and modelling compiled cryptographic primitives [PDF]

open access: yes, 2018
Cryptovirological augmentations present an immediate, incomparable threat. Over the last decade, the substantial proliferation of crypto-ransomware has had widespread consequences for consumers and organisations alike.
Bellekens, Xavier, Hill, Gregory
core   +3 more sources

Software protection through obfuscation [PDF]

open access: yes, 2019
Software, over the years, has evolved from free code given along with the hardware for free to a valuable asset, automating almost all of the electronic devices and systems. The growth in the software analyzing tools helped the software developers to analyze and better their software programs.
openaire   +2 more sources

Hardware and Software Methods for Secure Obfuscation and Deobfuscation: An In-Depth Analysis

open access: yesComputers
The swift evolution of information technology and growing connectivity in critical applications have elevated cybersecurity, protecting and certifying software and designs against rising cyber threats.
Khaled Saleh   +4 more
doaj   +1 more source

Code trolley: hardware-assisted control flow obfuscation [PDF]

open access: yes, 2020
Many cybersecurity attacks rely on analyzing a binary executable to find exploitable sections of code. Code obfuscation is used to prevent attackers from reverse engineering these executables.
Boskov, Novak   +2 more
core  

DETON: DEfeating hardware Trojan horses in microprocessors through software ObfuscatioN

open access: yesJournal of Systems Architecture, 2022
Hardware Trojan Horses (HTHs) represent today a serious issue not only for academy but also for industry because of the dramatic complexity and dangerousness attackers can count on. It has been shown that HTHs can be inserted in modern and complex microprocessors allowing the attacker to run malicious software, to acquire root privileges and to steal ...
Luca Cassano   +4 more
openaire   +2 more sources

Partial-indistinguishability obfuscation using braids [PDF]

open access: yes, 2014
An obfuscator is an algorithm that translates circuits into functionally-equivalent similarly-sized circuits that are hard to understand. Efficient obfuscators would have many applications in cryptography.
Alagic, Gorjan   +2 more
core   +2 more sources

Tuning the Electronic Structure and Spin State of Fe─N─C Catalysts Using an Axial Oxygen Ligand and Fe Clusters for High‐Efficiency Rechargeable Zinc–Air Batteries

open access: yesAdvanced Functional Materials, EarlyView.
A FeN4─O/Clu@NC‐0.1Ac catalyst containing atomically‐dispersed FeN4─O sites (medium‐spin Fe2+) and Fe clusters delivered a half‐wave potential of 0.89 V for ORR and an overpotential of 330 mV at 10 mA cm−2 for OER in 0.1 m KOH. When the catalyst was used in a rechargeable Zn–air battery, a power density of 284.5 mW cm−2 was achieved with excellent ...
Yongfang Zhou   +8 more
wiley   +1 more source

Stealthy Opaque Predicates in Hardware - Obfuscating Constant Expressions at Negligible Overhead

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2018
Opaque predicates are a well-established fundamental building block for software obfuscation. Simplified, an opaque predicate implements an expression that provides constant Boolean output, but appears to have dynamic behavior for static analysis.
Max Hoffmann, Christof Paar
doaj   +1 more source

Method of diversity software protection based on fusion compilation

open access: yes网络与信息安全学报, 2020
For the obvious characteristics and single mode of the existing common protection methods, with the help of the LLVM framework, a diversity software protection method based on fusion compilation was proposed.
XIONG Xiaobing, SHU Hui, KANG Fei
doaj   +3 more sources

BBDetector: A Precise and Scalable Third-Party Library Detection in Binary Executables with Fine-Grained Function-Level Features

open access: yesApplied Sciences, 2022
Third-party library (TPL) reuse may introduce vulnerable or malicious code and expose the software, which exposes them to potential risks. Thus, it is essential to identify third-party dependencies and take immediate corrective action to fix critical ...
Xiaoya Zhu   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy