Results 41 to 50 of about 21,953 (219)

On the Reverse Engineering of the Citadel Botnet [PDF]

open access: yes, 2014
Citadel is an advanced information-stealing malware which targets financial information. This malware poses a real threat against the confidentiality and integrity of personal and business data. A joint operation was recently conducted by the FBI and the
A Rahimian   +4 more
core   +3 more sources

Tuning the Electronic Structure and Spin State of Fe─N─C Catalysts Using an Axial Oxygen Ligand and Fe Clusters for High‐Efficiency Rechargeable Zinc–Air Batteries

open access: yesAdvanced Functional Materials, EarlyView.
A FeN4─O/Clu@NC‐0.1Ac catalyst containing atomically‐dispersed FeN4─O sites (medium‐spin Fe2+) and Fe clusters delivered a half‐wave potential of 0.89 V for ORR and an overpotential of 330 mV at 10 mA cm−2 for OER in 0.1 m KOH. When the catalyst was used in a rechargeable Zn–air battery, a power density of 284.5 mW cm−2 was achieved with excellent ...
Yongfang Zhou   +8 more
wiley   +1 more source

Software-based Decoy System for Insider Threats [PDF]

open access: yes, 2012
Decoy technology and the use of deception are useful in securing critical computing systems by confounding and confusing adversaries with fake information. Deception leverages uncertainty forcing adversaries to expend considerable effort to differentiate
Park, Younghee, Stolfo, Salvatore
core   +2 more sources

Mapping Nanoscale Buckling in Atomically Thin Cr2Ge2Te6

open access: yesAdvanced Functional Materials, EarlyView.
Atomic‐resolution STEM is used to resolve nanoscale buckling in monolayer Cr2Ge2Te₆. A noise‐robust image analysis reconstructs three‐dimensional lattice distortions from single plan‐view images, revealing pronounced defect‐driven nm‐scale out‐of‐plane buckling.
Amy Carl   +20 more
wiley   +1 more source

Code Obfuscation: A Comprehensive Approach to Detection, Classification, and Ethical Challenges

open access: yesAlgorithms
Code obfuscation has become an essential practice in modern software development, designed to make source or machine code challenging for both humans and computers to comprehend.
Tomer Raitsis   +5 more
doaj   +1 more source

Building an obfuscation compiler based on LLVM infrastructure

open access: yesТруды Института системного программирования РАН, 2018
The paper describes the obfuscating transformations, which were implemented while developing an LLVM-based obfuscating compiler in ISP RAS.  The proposed transformations are based on well-known obfuscation algorithms and are specifically improved to ...
V. P. Korchagin   +3 more
doaj   +1 more source

Source code obfuscation with genetic algorithms using LLVM code optimizations

open access: yesLogic Journal of the IGPL
Abstract With the advent of the cloud computing model allowing a shared access to massive computing facilities, a surging demand emerges for the protection of the intellectual property tied to the programs executed on these uncontrolled systems.
Torre Macías, Juan Carlos de la   +4 more
openaire   +3 more sources

Artificial Intelligence‐Assisted Workflow for Transmission Electron Microscopy: From Data Analysis Automation to Materials Knowledge Unveiling

open access: yesAdvanced Materials, EarlyView.
AI‐Assisted Workflow for (Scanning) Transmission Electron Microscopy: From Data Analysis Automation to Materials Knowledge Unveiling. Abstract (Scanning) transmission electron microscopy ((S)TEM) has significantly advanced materials science but faces challenges in correlating precise atomic structure information with the functional properties of ...
Marc Botifoll   +19 more
wiley   +1 more source

JDATATRANS for array obfuscation in Java source codes to defeat reverse engineering from decompiled codes

open access: yesProceedings of the 2nd Bangalore Annual Compute Conference, 2009
Software obfuscation or obscuring a software is an approach to defeat the practice of reverse engineering a software for using its functionality illegally in the development of another software. Java applications are more amenable to reverse engineering and re-engineering attacks through methods such as decompilation because Java class files store the ...
Sivadasan, Praveen   +2 more
openaire   +2 more sources

Light‐Induced Entropy for Secure Vision

open access: yesAdvanced Materials, EarlyView.
This work realized a ternary true random number generator by exploiting stochastic traps emerging within multiple junction interfaces, and quantitatively validated the generation of high‐quality random numbers. Furthermore, it successfully demonstrated diverse applications, including AI‐resilient image security, thereby providing a valuable guide for ...
Juhyung Seo   +9 more
wiley   +1 more source

Home - About - Disclaimer - Privacy