Results 31 to 40 of about 22,093 (250)
Obscuring Mobile Agents by Source Code Obfuscation
Security and performance are most essential and prime challenges for networking phenomenon. Computation on the remote host is generally done through links. Thus security is needed when the code is on the way to the destination host. A program travelling over the link is extremely venerable to be forged for malfunctioning.
Atul Mishra, Atul Srivastava, Veena Garg
openaire +1 more source
FPGA based remote code integrity verification of programs in distributed embedded systems [PDF]
The explosive growth of networked embedded systems has made ubiquitous and pervasive computing a reality. However, there are still a number of new challenges to its widespread adoption that include scalability, availability, and, especially, security of ...
Basile, Cataldo +2 more
core +1 more source
PDF-Malware Detection: A Survey and Taxonomy of Current Techniques [PDF]
Portable Document Format, more commonly known as PDF, has become, in the last 20 years, a standard for document exchange and dissemination due its portable nature and widespread adoption. The flexibility and power of this format are not only leveraged by
Aniello, L. +3 more
core +1 more source
Classification of Obfuscation Techniques in LLVM IR: Machine Learning on Vector Representations
We present a novel methodology for classifying code obfuscation techniques in LLVM IR program embeddings. We apply isolated and layered code obfuscations to C source code using the Tigress obfuscator, compile them to LLVM IR, and convert each IR code ...
Sebastian Raubitzek +3 more
doaj +1 more source
Obfuscation-Based Watermarking for Mobile Service Application Copyright Protection in the Cloud
The contributions of cloud computing in the prevention of software piracy are inadequate, and there are still rampant piratical mobile service applications in the cloud.
Sun Guang +4 more
doaj +1 more source
Array Data Transformation For Source Code Obfuscation
{"references": ["Markus Dahm, \u00d4\u00c7\u00ffByte Code Engineering with the BCEL API- Technical\nReport B-17-98, April 3, 2001.", "Arjan de Roo, Leon van den Oord, \u00d4\u00c7\u00ffStealthy obfuscation techniques:\nmisleading the pirates-, Department of Computer Science, University of\nTwente Enschede, The Netherlands.", "Sharath.K.Udupa.Saumya K ...
S. Praveen, P. Sojan Lal
openaire +2 more sources
AI‐Assisted Workflow for (Scanning) Transmission Electron Microscopy: From Data Analysis Automation to Materials Knowledge Unveiling. Abstract (Scanning) transmission electron microscopy ((S)TEM) has significantly advanced materials science but faces challenges in correlating precise atomic structure information with the functional properties of ...
Marc Botifoll +19 more
wiley +1 more source
Light‐Induced Entropy for Secure Vision
This work realized a ternary true random number generator by exploiting stochastic traps emerging within multiple junction interfaces, and quantitatively validated the generation of high‐quality random numbers. Furthermore, it successfully demonstrated diverse applications, including AI‐resilient image security, thereby providing a valuable guide for ...
Juhyung Seo +9 more
wiley +1 more source
Code Obfuscation: A Comprehensive Approach to Detection, Classification, and Ethical Challenges
Code obfuscation has become an essential practice in modern software development, designed to make source or machine code challenging for both humans and computers to comprehend.
Tomer Raitsis +5 more
doaj +1 more source
Building an obfuscation compiler based on LLVM infrastructure
The paper describes the obfuscating transformations, which were implemented while developing an LLVM-based obfuscating compiler in ISP RAS. The proposed transformations are based on well-known obfuscation algorithms and are specifically improved to ...
V. P. Korchagin +3 more
doaj +1 more source

