Results 61 to 70 of about 19,819 (285)

Code Obfuscation: A Comprehensive Approach to Detection, Classification, and Ethical Challenges

open access: yesAlgorithms
Code obfuscation has become an essential practice in modern software development, designed to make source or machine code challenging for both humans and computers to comprehend.
Tomer Raitsis   +5 more
doaj   +1 more source

DroidPDF: The Obfuscation Resilient Packer Detection Framework for Android Apps

open access: yesIEEE Access, 2020
The Android packing techniques were originally used to pack and conceal important information of the apps to prevent malicious developers from deconstructing the software logic.
Caijun Sun   +5 more
doaj   +1 more source

Temperature‐Resilient Reconfigurable Physical Unclonable Function Driven by Pulse Modulation Using CMOS‐Integrated Spintronic Chips

open access: yesAdvanced Science, EarlyView.
A reconfigurable physical unclonable function is developed using CMOS‐integrated SOT‐MRAM chips, leveraging a dual‐pulse strategy and offering enhanced environmental robustness. A temperature‐compensation effect arising from the CMOS transistor and SOT‐MTJ is revealed and established as a key prerequisite for thermal resilience.
Min Wang   +7 more
wiley   +1 more source

On the Activity Privacy of Blockchain for IoT

open access: yes, 2019
Security is one of the fundamental challenges in the Internet of Things (IoT) due to the heterogeneity and resource constraints of the IoT devices.
Dorri, Ali   +3 more
core   +1 more source

Staging an Experience of Cultural Heritage Preservation: Consumers' Willingness to Pay for Heirloom Rice in the Philippines

open access: yesAgribusiness, EarlyView.
ABSTRACT The Cordillera Administrative Region in the Philippines is home to terraced rice embedded in centuries of cultural heritage. However, weak market incentives threaten sustained production, jeopardizing indigenous communities' cultural heritage and the in situ biodiversity of rice genetic resources.
Kofi Britwum, Matty Demont
wiley   +1 more source

A note on the concept of obfuscation.

open access: yesТруды Института системного программирования РАН, 2004
In this paper we address the issue of defining security of program obfuscation. We argue that requirements to obfuscated programs may be different and are dependent on potential applications. Therefore three distinct models are suggested for studying the
N.P. Varnovsky
doaj  

Diversified Compilation Method Based on LLVM [PDF]

open access: yesJisuanji gongcheng
When diversifying projects composed of multiple C/C++ source files, most of the existing software diversification tools adopt the same diversification method for all functions in a single C/C++ source file, which leads to a single diversification method ...
CHEN Yingchao, WANG Junchao, PANG Jianmin, YUE Feng
doaj   +1 more source

VAE+DDPG: An Attention‐Enhanced Variational Autoencoder for Deep Reinforcement Learning‐Based Autonomous Navigation in Low‐Light Environments

open access: yesAdvanced Intelligent Systems, EarlyView.
Variational Autoencoder+Deep Deterministic Policy Gradient addresses low‐light failures of infrared depth sensing for indoor robot navigation. Stage 1 pretrains an attention‐enhanced Variational Autoencoder (Convolutional Block Attention Module+Feature Pyramid Network) to map dark depth frames to a well‐lit reconstruction, yielding a 128‐D latent code ...
Uiseok Lee   +7 more
wiley   +1 more source

Expanded application to plant reproductive tissues of a branched DNA probe‐based in situ hybridization method

open access: yesApplications in Plant Sciences, EarlyView.
Abstract Premise Detecting clear tissue‐ and organ‐specific patterns of gene expression is key to understanding the genetic mechanisms that control plant development. In situ hybridization (ISH) of mRNA is one of the most precise, yet most challenging approaches to gene expression assays.
Brooklyn M. Anaya   +3 more
wiley   +1 more source

Obfuscation-Resilient Software Plagiarism Detection with JPlag

open access: yesProceedings of the 2024 IEEE/ACM 46th International Conference on Software Engineering: Companion Proceedings
The rise of automated obfuscation techniques challenges the widespread assumption that evading a software plagiarism detector requires more effort than completing programming and modeling assignments in computer science education. This threatens plagiarism detectors without comprehensive obfuscation resilience and, ultimately, academic integrity.
Timur Sağlam   +3 more
openaire   +3 more sources

Home - About - Disclaimer - Privacy