نتایج جستجو برای: obfuscation
تعداد نتایج: 1527 فیلتر نتایج به سال:
¡¡¡¡¡¡¡ 200402.tex ABSTRACT To detect theft of Java class files efficiently, we have so far proposed a concept of Java birthmarks. Since the birthmarks are unique and native characteristics of every class file, a class file with the same birthmark of another can be easily suspected as a copy. However, performance and tolerance of the birthmarks against sophisticated attacks had not been evaluat...
Openness is an unruly concept. While free tends toward ambiguity (free as in speech, or free as in beer?), open tends toward obfuscation. Everyone claims to be open, everyone has something to share, everyone agrees that being open is the obvious thing to do-after all, but for all its nt of Free Software. It is never quite clear whether being open is a means or an end. Worse, the opposite of ope...
2. In contrast to the stridency of its tone and conclusions, however, the arguments contained within LECG’s Critique are astonishingly weak. It comprises, in essence, a series of erroneous or irrelevant arguments evidently in the hope that Ofcom might fail to recognise their weakness and attach some weight to LECG’s conclusions. We can only hope that Ofcom is able to see through such obfuscatio...
The application of International Financial Reporting Standards (IFRS) has been introduced in many countries to enhance efficiencies financial markets and improve communication reporting. However, extant studies have suggested that the introduction IFRS increased narrative complexity, owing demand for more Considering accounting complexity can be either informative (enhancing understanding) or n...
Title of Thesis: SECURITY THROUGH OBSCURITY: LAYOUT OBFUSCATION OF DIGITAL INTEGRATED CIRCUITS USING DON’T CARE CONDITIONS Sana Mehmood Awan, Master of Science, 2015 Directed By: Professor Gang Qu, Department of Electrical and Computer Engineering and Institute for Systems Research, University of Maryland Contemporary integrated circuits are designed and manufactured in a globalized environment...
Succinct non-interactive arguments (SNARGs) enable verifying NP computations with substantially lower complexity than that required for classical NP verification. In this work, we first construct a lattice-based SNARG candidate with quasi-optimal succinctness (where the argument size is quasilinear in the security parameter). Further extension of our methods yields the first SNARG (from any ass...
We treat the problem of analog integrated circuit (IC) obfuscation toward intellectual property (IP) protection against reverse engineering. Obfuscation is achieved by camouflaging effective geometry layout components via use fake contacts, which originally were proposed for gate in digital ICs. present a library obfuscated components, we give recommendations camouflaging, discuss foreseen atta...
The only digital forensic tools known to provide an automated approach for evaluating XOR obfuscated data are DCCI Carver and DC3 Carver, two general-purpose carving tools developed by the Defense Cyber Crime Center (DC3). In order to determine the use of XOR as an obfuscation technique and the need to adapt additional tools, we analyzed 2,411 drive images from devices acquired from countries a...
We develop a dynamic model to study the interaction between obfuscation and investor sophistication in retail financial markets. Taking into account different learning mechanisms within the investor population, we characterize the optimal timing of obfuscation for a profitmaximizing monopolist. We show that educational initiatives that are directed to facilitate learning by investors may induce...
Recently, a number of obfuscation systems have been developed to aid in censorship circumvention scenarios where encrypted network traffic is filtered. In this paper, we present Marionette, the first programmable network traffic obfuscation system capable of simultaneously controlling encrypted traffic features at a variety of levels, including ciphertext formats, stateful protocol semantics, a...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید