نتایج جستجو برای: obfuscation

تعداد نتایج: 1527  

Journal: :IACR Cryptology ePrint Archive 2015
Prabhanjan Vijendra Ananth Abhishek Jain Amit Sahai

In this work, we introduce patchable obfuscation: our notion adapts the notion of indistinguishability obfuscation (iO) to a very general setting where obfuscated software evolves over time. We model this broadly by considering software patches P as arbitrary Turing Machines that take as input the description of a Turing Machine M , and output a new Turing Machine description M ′ = P (M). Thus,...

Journal: :The Journal of Industrial Economics 2014

Journal: :IEEE Transactions on Smart Grid 2020

Journal: :The RAND Journal of Economics 2018

Journal: :Journal of Computer Networks and Communications 2018

Journal: :Journal of Business Finance & Accounting 2023

Anecdotally, not all investors are able to read and understand the financial report. I consider a strategic reporting game where bounded rational only pay attention randomly sampled parts of report then extrapolate value firm based on this. The manager can both obfuscate bias Obfuscation works by disaggregating into any number line items, modeled as nonnegative signals, whose mean is constraine...

2010
Yoni De Mulder Nessim Kisserli Jan Cappaert Nikos Mavrogiannopoulos Bart Preneel

This paper presents a method for transforming a function into a combination of correlated perturbated functions by splitting its input space into sub-spaces, assigning each to a different function in such a way that a majority vote on their outputs will always yield the correct initial functions output. This novel technique allows function obfuscation and implementation diversication. Applicati...

2015
Khadijeh Khoshnavataher Vahid Zarrabi Salar Mohtaj Habibollah Asghari

The task of text alignment corpus construction at PAN 2015 competition consists of preparing a plagiarism corpus so that it can provide various obfuscation types and versatile obfuscation degrees. Meanwhile, its format and metadata structure should follow previous PAN plagiarism corpora. In this paper, we describe our approach for construction of a monolingual Persian plagiarism corpus that can...

2005
Tatsuya Toyofuku Toshihiro Tabata Kouichi Sakurai

For the security technology that has been achieved with software in the computer system and the protection of the intellectual property right of software, software protection technology is necessary. One of those techniques is called obfuscation, which converts program to make analysis difficult while preserving its function. In this paper, we examine the applicability of our program obfuscatio...

2008
Shafi Goldwasser

Program obfuscation is the process of taking a program as an input and modifying it so that the resulting program has the same I/O behavior as the input program but otherwise looks`completely garbled' to the entity that runs it, even if this entity is adversarial and has full access to the program. Impossibility results, origination with the work of Barak etal in 2001, have been proved that ass...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید