نتایج جستجو برای: obfuscation

تعداد نتایج: 1527  

Journal: :IJCSA 2011
Yuanyu Wei Kazuo Ohzeki

This paper describes new two obfuscation methods the fist method can control computational complexity and the second method can achieve semantic obfuscation. The computational complexity can be strictly controlled by using the technique of RSA encryption. The computational complexity can be arbitrarily specified by the impossibility of factorization of prime number in RSA encryption method. Sem...

2011
Nir Bitansky Ran Canetti Shafi Goldwasser Shai Halevi Yael Tauman Kalai Guy N. Rothblum

We consider general program obfuscation mechanisms using “somewhat trusted” hardware devices, with the goal of minimizing the usage of the hardware, its complexity, and the required trust. Specifically, our solution has the following properties: (i) The obfuscation remains secure even if all the hardware devices in use are leaky. That is, the adversary can obtain the result of evaluating any fu...

2003
Kazuhide Fukushima Kouichi Sakurai

Embedding a personal identifier as a watermark to Java classfile is effective in order to protect copyrights of them. Monden et al.[1] proposed watermarking scheme that embeds arbitrary character sequence to the target method in a Java classfiles. But the scheme can be only used to embed the same watermark to each user’s classfiles. Therefore, if we apply this scheme for embedding each user’s p...

2009
Amitabh Saxena Brecht Wyseur Bart Preneel

While code obfuscation attempts to hide certain characteristics of a program independently of an application, white-box cryptography (WBC) specifically focuses on software implementations of cryptographic primitives in an application. The aim of WBC is to resist attacks from an adversary having access to some ‘executable’ code with an embedded secret key. WBC, if possible, would have several ap...

Journal: :Inf. Sci. 2007
Stephen Drape

An obfuscation is a behaviour-preserving program transformation whose aim is to make a program “harder to understand”. Obfuscations are mainly applied to make reverse engineering of object-oriented programs more difficult. In this paper, we propose a fresh approach by obfuscating abstract data-types allowing us to develop structuredependent obfuscations that would otherwise (traditionally) not ...

Journal: :Scottish Journal of Political Economy 2016

Journal: :International Journal of Control 2015

Journal: :Journal of Computing Science and Engineering 2008

Journal: :International Journal of Engineering & Technology 2018

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید