نتایج جستجو برای: deobfuscation

تعداد نتایج: 38  

Journal: :Cryptography 2022

Key-based circuit obfuscation or logic-locking is a technique that can be used to hide the full design of an integrated from untrusted foundry end-user. The based on creating ambiguity in original by inserting “key” input bits into such unintelligible absent correct secret key. Clock signals have traditionally been avoided locking order not corrupt timing behavior locked circuit. In this paper,...

2014
DMITRIY DUNAEV

The essence of obfuscation is to entangle the code and eliminate the majority of logical links in it. The offered theoretical apparatus allows describing obfuscated routines by concatenation of original and fake operational logics. This approach considers not only instructions or routines themselves, but the actions (results) they produce, what makes obfuscation a process of adding excessive fu...

2008
Saumya K. Debray Kevin P. Coogan Gregg M. Townsend

The rapid increase in attacks on software systems via malware such as viruses, worms, trojans, etc., has made it imperative to develop effective techniques for detecting and analyzing malware binaries. Such binaries are usually transmitted in packed or encrypted form, with the executable payload decrypted dynamically and then executed. In order to reason formally about their execution behavior,...

2016
Dongpeng Xu Jiang Ming Dinghao Wu

Opaque predicate obfuscation, a low-cost and stealthy control flow obfuscation method to introduce superfluous branches, has been demonstrated to be effective to impede reverse engineering efforts and broadly used in various areas of software security. Conventional opaque predicates typically rely on the invariant property of well-known number theoretic theorems, making them easy to be detected...

Journal: :ACM Journal on Emerging Technologies in Computing Systems 2021

Logic locking is a prominent technique to protect the integrity of hardware designs throughout integrated circuit design and fabrication flow. However, in recent years, security schemes has been thoroughly challenged by introduction various deobfuscation attacks. As most research branches, deep learning being introduced domain logic as well. Therefore, this article we present SnapShot, novel at...

Journal: :CoRR 2018
Nestor Rodriguez Sergio Rojas Galeano

Background. Lack of moderation in online communities enables participants to incur in personal aggression, harassment or cyberbullying, issues that have been accentuated by extremist radicalisation in the contemporary post-truth politics scenario. This kind of hostility is usually expressed by means of toxic language, profanity or abusive statements. Recently Google has developed a machine-lear...

Journal: :Digital threats 2022

Logic locking is a circuit obfuscation technique that inserts additional key gates to the original in order prevent potential threats such as overproduction, piracy, and counterfeiting. The encrypted generates desired outputs only when correct keys are applied gates. Previous works have identified vulnerability of logic satisfiability (SAT)-based attacks. However, SAT attacks unscalable limited...

2016
Mizuhito Ogawa

Modern malware extensively applies self-modifying obfuscation techniques, e.g., self-decryption and mutation, which are often automatically prepared by packers. Their aim is to confuse control structures and bypass commercial anti-virus software based on binary signatures. A popular method in industry to analyze malware is a dynamic analysis in a sand-box. Alternatively, we apply a hybrid metho...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید