نتایج جستجو برای: obfuscation
تعداد نتایج: 1527 فیلتر نتایج به سال:
We study the problem of circuit obfuscation, i.e., transforming the circuit in a way that hides everything except its input-output behavior. Barak et al. showed that a universal obfuscator that obfuscates every circuit class cannot exist, leaving open the possibility of special-purpose obfuscators. Known positive results for obfuscation are limited to point functions (boolean functions that ret...
Investor sophistication has lagged behind the growing complexity of retail financial markets. To explore this, we develop a dynamic model to study the interaction between obfuscation and investor sophistication in mutual fund markets. Taking into account different learning mechanisms within the investor population, we characterize the optimal timing of obfuscation for financial institutions who...
We initiate the study of extractability obfuscation, a notion first suggested by Barak et al. (JACM 2012): An extractability obfuscator eO for a class of algorithms M guarantees that if an efficient attacker A can distinguish between obfuscations eO(M1), eO(M2) of two algorithms M1,M2 ∈M, then A can efficiently recover (given M1 and M2) an input on which M1 and M2 provide different outputs. • W...
Abstract Advances in deep learning have made face recognition technologies pervasive. While useful to social media platforms and users, this technology carries significant privacy threats. Coupled with the abundant information they about service providers can associate users interactions, visited places, activities, preferences–some of which user may not want share. Additionally, facial models ...
In this paper, we propose an architecture that protects software by the hardware. The protection hardware can reside on the local machine in the form of a chip or on a remote server on the same network. We show that such a protection method can be combined with the code obfuscation method and develop two obfuscation methods for the proposed software protection architecture.
Abstract In this paper, we are addressing the relationship between ambiguity and obscurity by comparing political with literary use of language. particular, considering contexts in which ambiguity, deriving from underspecification, is strategically used as a device to establish certain degree obscurity. We suggest that strategy based on an undeclared identification meanings fact distinct, thus ...
In this document we present the CSPIM virtual machine-based code encryptor, discuss open issues related to its Application Programming Interface (API), obfuscation issues, and propose enhancements. The discussed enhancements include a new, simpler, programming inteface and a new obfuscation profile.
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید