نتایج جستجو برای: obfuscation

تعداد نتایج: 1527  

Journal: :International journal of scientific research in computer science, engineering and information technology 2023

In today's environment, a huge and increasing range of unauthorised practises allows hackers to get access devices private information by inserting harmful code. The purpose this research is assess the efficiency obfuscation strategies in safeguarding software against reverse engineering tampering. This study tries evaluate various approaches, such as code obfuscation, control flow data obfusca...

Journal: :IACR Cryptology ePrint Archive 2015
Máté Horváth

The recent result of Garg et al. (FOCS 2013) changed the previously pessimistic attitude towards general purpose cryptographic obfuscation. Since their first candidate construction, several authors proposed newer and newer schemes with more persuasive security arguments and better efficiency. At the same time, indistinguishability obfuscation proved its extreme usefulness by becoming the basis ...

2005
Arini Balakrishnan Chloe Schulze

In this paper we survey the current literature on code obfuscation and review current practices as well as applications. We analyze the different obfuscation techniques in relation to protection of intellectual property and the hiding of malicious code. Surprisingly, the same techniques used to thwart reverse engineers are used to hide malicious code from virus scanners. Additionally, obfuscati...

Journal: :CoRR 2018
Jianlei Yang Xueyan Wang Qiang Zhou Zhaohao Wang Hai Li Yiran Chen Weisheng Zhao

Circuit obfuscation is a frequently used approach to conceal logic functionalities in order to prevent reverse engineering attacks on fabricated chips. Efficient obfuscation implementations are expected with lower design complexity and overhead but higher attack difficulties. In this paper, an emerging obfuscation approach is proposed by leveraging spinorbit torque (SOT) devices based look-up-t...

Journal: :CoRR 2015
Sebastian Banescu Tobias Wüchner Marius Guggenmos Martín Ochoa Alexander Pretschner

Program obfuscation is increasingly popular among malware creators. Objectively comparing different malware detection approaches with respect to their resilience against obfuscation is challenging. To the best of our knowledge, there is no common empirical framework for evaluating the resilience of malware detection approaches w.r.t. behavior obfuscation. We propose and implement such a framewo...

2009
Mariano Ceccato Yoram Ofek

Source code obfuscation is a protection mechanism widely used to limit the possibility of malicious reverse engineering or attack activities on a software system. Although several code obfuscation techniques and tools are available, little knowledge is available about the capability of obfuscation to reduce attackers' efficiency, and the contexts in which such an efficiency may vary. This docum...

Journal: :Journal of Accounting and Economics 2021

Mutual funds hold 32% of the U.S. equity market and comprise 58% retirement savings, yet retail investors consistently make poor choices when selecting funds. Theory suggests are partially due to fund managers creating unnecessarily complex disclosures fee structures keep uninformed obfuscate performance. An empirical challenge in investigating this “strategic obfuscation” theory is isolating m...

Journal: :IACR Cryptology ePrint Archive 2015
Mei Wang Zheng Yuan Xiao Feng

We proposed a new secure oblivious transfer protocol from indistinguishability obfuscation in this paper. Our main technical tool is the candidate indistinguishability obfuscation introduced in [1] and a dual-mode cryptosystem proposed in [2]. Following their steps, we presents a new k-out-of-l oblivious transfer protocol, its realization from DDH is described in this paper, in which we combine...

2002
Matthias Jacob Dan Boneh Edward W. Felten

We study the strength of certain obfuscation techniques used to protect software from reverse engineering and tampering. We show that some common obfuscation methods can be defeated using a fault injection attack, namely an attack where during program execution an attacker injects errors into the program environment. By observing how the program fails under certain errors the attacker can deduc...

2010
Stephen Drape

In this technical report, we discuss the use of code obfuscation as means of protecting the intellectual property of software. An obfuscation is a behaviour preserving program transformation which aims to make a program harder to understand (which can mean it becomes unintelligible to automated program comprehension tools or that the result of program analyses become less useful to a human adve...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید