نتایج جستجو برای: obfuscation

تعداد نتایج: 1527  

Journal: :Computer Communications 2015
Pericle Perazzo Gianluca Dini

As location-based services emerge, many people feel exposed to high privacy threats. Privacy protection is a major challenge for such services and related applications. A simple approach is perturbation, which adds an artificial noise to positions and returns an obfuscated measurement to the requester. Our main finding is that, unless the noise is chosen properly, these methods do not withstand...

2014
Ranjeet Singh Andy King

The fact that Java is platform independent gives hackers the opportunity to write exploits that can target users on any platform, which has a JVM implementation. To circumvent detection by anti virus (AV) software, obfuscation techniques are routinely applied to make an exploit more difficult to recognise. Popular obfuscation techniques for Java include string obfuscation and applying reflectio...

2005
Srinivasan Chandrasekharan Saumya Debray

In recent years, code obfuscation has attracted attention as a low cost approach to improving software security by making it difficult for attackers to understand the inner workings of proprietary software systems. This paper examines the extent to which current obfuscation techniques succeed in making programs harder to reverse engineer. Our results indicate that many obfuscations, designed to...

Journal: :Journal of Hardware and Systems Security 2018

Journal: :The Lancet Respiratory Medicine 2016

2016
Xiaoxiao Tang Yu Liang Xinjie Ma Yan Lin Debin Gao

Attackers use reverse engineering techniques to gain detailed understanding of executable for malicious purposes, such as re-packaging an Android app to inject malicious code or advertising components. To make reverse engineering more difficult, researchers have proposed various code obfuscation techniques to conceal purposes or logic of code segments. One interesting idea of code obfuscation i...

2017
Kato Mivule

While search engines have become vital tools for searching information on the Internet, privacy issues remain a growing concern due to the technological abilities of search engines to retain user search logs. Although such capabilities might provide enhanced personalized search results, the confidentiality of user intent remains uncertain. Even with web search query obfuscation techniques, anot...

2017
Julian Kirsch Clemens Jonischkeit Thomas Kittel Apostolis Zarras Claudia Eckert

Piracy is a persistent headache for software companies that try to protect their assets by investing both time and money. Program code obfuscation as a sub-field of software protection is a mechanism widely used toward this direction. However, effectively protecting a program against reverse-engineering and tampering turned out to be a highly non-trivial task that still is subject to ongoing re...

Journal: :CoRR 2013
Ahmed M. Elmisery Dmitri Botvich

One of the concerns users have to confronted when using IPTV system is information overload that makes it difficult for them to find a suitable content according to their personal preferences. Recommendation service is one of the most widely adopted technologies to alleviating this problem; these services intend to provide people with referrals of items they will appreciate based upon their pre...

2014
Shakya Sundar Das S. K. Jena

Code Obfuscation is a protection technique that transforms the software into a semantically equivalent one which is strenuous to reverse engineer. As a part of software protection and security, code obfuscation got commercial interest from both vendors’ side to keep their proprietary as secret and customers’ side to have a trusted software that don’t leek or destroy their personal information. ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید