نتایج جستجو برای: obfuscation

تعداد نتایج: 1527  

Journal: :IACR Cryptology ePrint Archive 2006
Arvind Narayanan Vitaly Shmatikov

We study the problem of circuit obfuscation, i.e., transforming the circuit in a way that hides everything except its input-output behavior. Barak et al. showed that a universal obfuscator that obfuscates every circuit class cannot exist, leaving open the possibility of special-purpose obfuscators. Known positive results for obfuscation are limited to point functions (boolean functions that ret...

2010
Bruce Ian Carlin Gustavo Manso Leonid Kogan David Laibson Francis Longstaff Holger Mueller Lubos Pastor

Investor sophistication has lagged behind the growing complexity of retail financial markets. To explore this, we develop a dynamic model to study the interaction between obfuscation and investor sophistication in mutual fund markets. Taking into account different learning mechanisms within the investor population, we characterize the optimal timing of obfuscation for financial institutions who...

2013
Elette Boyle Kai-Min Chung Rafael Pass

We initiate the study of extractability obfuscation, a notion first suggested by Barak et al. (JACM 2012): An extractability obfuscator eO for a class of algorithms M guarantees that if an efficient attacker A can distinguish between obfuscations eO(M1), eO(M2) of two algorithms M1,M2 ∈M, then A can efficiently recover (given M1 and M2) an input on which M1 and M2 provide different outputs. • W...

Journal: :Review of Industrial Organization 2019

Journal: :International Journal of Industrial Organization 2010

Journal: :Proceedings on Privacy Enhancing Technologies 2021

Abstract Advances in deep learning have made face recognition technologies pervasive. While useful to social media platforms and users, this technology carries significant privacy threats. Coupled with the abundant information they about service providers can associate users interactions, visited places, activities, preferences–some of which user may not want share. Additionally, facial models ...

2007
Bin Fu Sai Aravalli John Abraham

In this paper, we propose an architecture that protects software by the hardware. The protection hardware can reside on the local machine in the form of a chip or on a remote server on the same network. We show that such a protection method can be combined with the code obfuscation method and develop two obfuscation methods for the proposed software protection architecture.

Journal: :Agenda - A Journal of Policy Analysis and Reform 1995

Journal: :Lili-zeitschrift Fur Literaturwissenschaft Und Linguistik 2022

Abstract In this paper, we are addressing the relationship between ambiguity and obscurity by comparing political with literary use of language. particular, considering contexts in which ambiguity, deriving from underspecification, is strategically used as a device to establish certain degree obscurity. We suggest that strategy based on an undeclared identification meanings fact distinct, thus ...

2013
Nikos Mavrogiannopoulos

In this document we present the CSPIM virtual machine-based code encryptor, discuss open issues related to its Application Programming Interface (API), obfuscation issues, and propose enhancements. The discussed enhancements include a new, simpler, programming inteface and a new obfuscation profile.

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید