نتایج جستجو برای: obfuscation

تعداد نتایج: 1527  

2008
Hiroki Yamauchi Akito Monden Masahide Nakamura Haruaki Tamada Yuichiro Kanzaki Ken-ichi Matsumoto

Various software obfuscation techniques have been proposed. However, there are few discussions on proper use of these obfuscations against imaginable threats. An ad-hoc use of obfuscations cannot guarantee that a program is sufficiently protected. For a systematic use of obfuscations and the verification of the result, this paper proposes a goal oriented approach to obfuscation. Specifically, w...

Journal: :I. J. Network Security 2008
Alec Yasinsac Jeffrey Todd McDonald

One approach to protect distributed systems implemented with mobile code is through program obfuscation. Disguising program intent is a form of information hiding that facilitates tamper proofing. By hiding program intent, adversaries are reduced to non-semantics attacks such as blind disruption or operating system level attacks (e.g. buffer overflows). In this paper, we amplify the Barak resul...

2016
S. Saravanakumar

The common positioning of Automated Fingerprint Identification Systems (AFIS) in law enforcement and border control submissions has sensitive the need for safeguarding that these systems are not compromised. Whereas numerous problems associated to fingerprint system safekeeping have been considered, including the use of phony fingerprints for masquerading personality, the problem of fingerprint...

2006
Mila Dalla Preda Matias Madou Koen De Bosschere Roberto Giacobazzi

Code obfuscation and software watermarking are well known techniques designed to prevent the illegal reuse of software. Code obfuscation prevents malicious reverse engineering, while software watermarking protects code from piracy. An interesting class of algorithms for code obfuscation and software watermarking relies on the insertion of opaque predicates. It turns out that attackers based on ...

2014
Mark Zhandry

We propose a new cryptographic primitive called witness pseudorandom functions (witness PRFs). Witness PRFs are related to witness encryption, but appear strictly stronger: we show that witness PRFs can be used for applications such as multi-party key exchange without trsuted setup, polynomially-many hardcore bits for any one-way function, and several others that were previously only possible u...

2016
Baiyu Li Daniele Micciancio

We present two general constructions that can be used to combine any two functional encryption (FE) schemes (supporting a bounded number of key queries) into a new functional encryption scheme supporting a larger number of key queries. By using these constructions iteratively, we transform any primitive FE scheme supporting a single functional key query (from a sufficiently general class of fun...

2008
Seongje Cho Hyeyoung Chang Yookun Cho

Obfuscation is one of the most effective methods to protect software against malicious reverse engineering intentionally making the code more complex and confusing. In this paper, we implement and evaluate an obfuscation tool, or obfuscator for protecting the intellectual property of C/C++ source code. That is, this paper presents an implementation of a code obfuscator, a tool which transforms ...

2004
Kelly Heffner Christian S. Collberg

Code obfuscations are semantics-preserving code transformations used to protect a program from reverse engineering. There is generally no expectation of complete, long-term, protection. Rather, there is a trade-off between the protection afforded by an obfuscation (i.e. the amount of resources an adversary has to expend to overcome the layer of confusion added by the transformation) and the res...

2011
Quoc Cuong To Tran Khanh Dang Josef Küng

The privacy protection of personal location information increasingly gains special attention in the field of location-based services, and obfuscation is the most popular technique aiming at protecting this sensitive information. However, all of the conventional obfuscation techniques are geometry-based and separated from the database level. Thus, the query processing has two timeconsuming phase...

2017
Jon Stephens Babak Yadegari Christian Collberg Saumya Debray Carlos Scheidegger

This paper presents a program obfuscation framework that uses covert channels through the program’s execution environment to obfuscate information flow through the program. Unlike prior works on obfuscation, the use of covert channels removes visible information flows from the computation of the program and reroutes them through the program’s runtime system and/or the operating system. This ren...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید