Results 51 to 60 of about 19,819 (285)

OBSCURE: Versatile Software Obfuscation from a Lightweight Secure Element

open access: yesTransactions on Cryptographic Hardware and Embedded Systems
Software obfuscation is a powerful tool to protect the intellectual property or secret keys inside programs. Strong software obfuscation is crucial in the context of untrusted execution environments (e.g., subject to malware infection) or to face ...
Darius Mercadier   +3 more
doaj   +1 more source

A Covert Data Transport Protocol

open access: yes, 2017
Both enterprise and national firewalls filter network connections. For data forensics and botnet removal applications, it is important to establish the information source.
Brooks, Richard   +4 more
core   +1 more source

Context‐Dependent Role of GDF15: GDF15+ Tumor‐Associated Macrophages Suppress OSCC Progression by Enhancing Phagocytosis

open access: yesAdvanced Science, EarlyView.
This study identifies GDF15+ TAMs as a cell subset mediating tumor regression after immunotherapy. Macrophage‐intrinsic GDF15 enhances phagocytosis and antigen cross‐presentation to CD8+ T cells through the NF‐κB signaling pathway, thereby inhibiting tumor progression.
Xinyu Zhou   +9 more
wiley   +1 more source

A Framework to Quantify the Quality of Source Code Obfuscation

open access: yesApplied Sciences
Malicious reverse engineering of software has served as a valuable technique for attackers to infringe upon and steal intellectual property. We can employ obfuscation techniques to protect against such attackers as useful tools to safeguard software ...
Hongjoo Jin   +4 more
doaj   +1 more source

Postsynaptic Complexin Mediates Constitutive Exocytosis of Nicotinic Acetylcholine Receptor

open access: yesAdvanced Science, EarlyView.
Beyond its established presynaptic role, complexin is identified as a postsynaptic regulator of neurotransmitter receptor trafficking. By promoting constitutive and activity‐dependent exocytosis of nicotinic acetylcholine receptors, complexin controls spontaneous synaptic signaling at the C.
Ya Wang   +4 more
wiley   +1 more source

A Method for Construction of Software Protection Technology Application Sequence Based on Petri Net With Inhibitor Arcs

open access: yesIEEE Access, 2018
In the field of software protection, when there is a dependence between the various software protection technologies, the application order of these technologies must be arranged in a correct way in order to maximize the protection effect.
Qing Su, Fan He, Naiqi Wu, Zhiyi Lin
doaj   +1 more source

The Faraday Scalpel: Electrochemical Nerve Lesioning Mechanisms Studied in Invertebrate Models

open access: yesAdvanced Science, EarlyView.
Direct‐current produces nerve lesioning through discrete electrochemical reactions. Using hypoxia‐sensitive locust nerves and hypoxia‐tolerant leech nerves, we map three injury pathways: cathodic oxygen reduction, cathodic alkalization, and anodic chloride oxidation. These findings establish electrochemical lesioning—the “Faraday Scalpel”—as a precise,
Petra Ondráčková   +5 more
wiley   +1 more source

Sphinx: A Secure Architecture Based on Binary Code Diversification and Execution Obfuscation [PDF]

open access: yes, 2018
Sphinx, a hardware-software co-design architecture for binary code and runtime obfuscation. The Sphinx architecture uses binary code diversification and self-reconfigurable processing elements to maintain application functionality while obfuscating the ...
Ehret, Alan   +3 more
core   +1 more source

Vulnerability Analysis and Detection of Android System Signature [PDF]

open access: yesJisuanji gongcheng, 2019
Aiming at the problem that an attacker can issue pirated software by re-signing the vulnerabilities in the self-signature process of Android system application program,this paper analyses the digital signature and verification process of Android system ...
LIAO Fangyuan, GAN Zhiwang
doaj   +1 more source

Low Power Optoelectronic Neuromorphic Memristor for In‐Sensor Computing and Multilevel Hardware Security Communications

open access: yesAdvanced Science, EarlyView.
ABSTRACT Conventional software‐based encryption faces mounting limitations in power efficiency and security, inspiring the development of emerging neuromorphic computing hardware encryption. This study presents a hardware‐level multi‐dimensional encryption paradigm utilizing optoelectronic neuromorphic devices with low energy consumption of 3.3 fJ ...
Bo Sun   +3 more
wiley   +1 more source

Home - About - Disclaimer - Privacy