نتایج جستجو برای: obfuscation

تعداد نتایج: 1527  

2005
Matt Duckham Lars Kulik

Current mobile computing systems can automatically sense and communicate detailed data about a person’s location. Location privacy is an urgent research issue because concerns about privacy are seen to be inhibiting the growth of mobile computing. This paper investigates a new technique for safeguarding location privacy, called obfuscation, which protects a person’s location privacy by degradin...

Journal: :JoWUA 2015
Jonghwa Park Hyojung Kim Younsik Jeong Seong-je Cho Sangchul Han Minkyu Park

Code obfuscation is a technique to transform a program into an equivalent one that is harder to be reverse engineered and understood. On Android, well-known obfuscation techniques are shrinking, optimization, renaming, string encryption, control flow transformation, etc. On the other hand, adversaries may also maliciously use obfuscation techniques to hide pirated or stolen software. If pirated...

2005
Suma Venkatesh Levent Ertaul

Over the years, several software protection techniques have been developed to avoid global software piracy, which has increased over 40% and has caused $11 billion loss. Code Obfuscation is one of these techniques and it is very promising one. Code obfuscation is a form of software protection against unauthorized reverse-engineering. In this paper, we give information about available software o...

2006
Matthew Karnick Jeffrey MacBride Sean McGinnis Ying Tang Ravi Ramachandran

Code obfuscation is a promising defense technology that secures software in a way that makes the cost of reverse engineering prohibitively high. While there are a number of commercial obfuscation tools on the market, there is no standard measurement to analyze and evaluate their strength. This paper addresses this challenge. An analytical metrics is developed to quantify the performance of obfu...

Journal: :IACR Cryptology ePrint Archive 2017
David Cousins Giovanni Di Crescenzo Kamil Doruk Gür Kevin King Yuriy Polyakov Kurt Rohloff Gerard W. Ryan Erkay Savas

We address the practicality challenges of secure program obfuscation by implementing, optimizing, and experimentally assessing an approach to securely obfuscate conjunction programs proposed in [1]. Conjunction programs evaluate functions f (x1, . . . , xL) = ∧ i∈I yi, where yi is either xi or ¬xi and I ⊆ [L], and can be used as classifiers. Our obfuscation approach satisfies distributional Vir...

Journal: :Chinese Journal of Electronics 2023

The pattern-matching problem with wildcards can be formulated as a conjunction where an accepting string is same the pattern for all non-wild-cards. A scheme of obfuscation algorithm that “encrypt” to prevent some adversary from forging any string. Since 2013, there are abundant works about which discussed weak/strong functionality preservation and distributed black-box security. These based on...

Journal: :IACR Cryptology ePrint Archive 2015
Mohammad Mahmoody Ameer Mohammed Soheil Nematihaji

The celebrated work of Barak et al. (Crypto’01) ruled out the possibility of virtual blackbox (VBB) obfuscation for general circuits. The recent work of Canetti, Kalai, and Paneth (TCC’15) extended this impossibility to the random oracle model as well assuming the existence of trapdoor permutations (TDPs). On the other hand, the works of Barak et al. (Crypto’14) and Brakerski-Rothblum (TCC’14) ...

Journal: :Journal of Cryptology 2013

Journal: :Journal of Cryptology 2020

2014
V. Aranov A. Terentiev

Overlapped executable code is an attractive artifact of obfuscation technology not yet widely covered and researched. Overlapped code and opaque predicates technologies together allows creation of prominent software obfuscation technologies featuring both obscure executable code and code protected from patching due to hard-to-track relations with other code. The paper provides polynomial algori...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید