نتایج جستجو برای: obfuscation

تعداد نتایج: 1527  

2007
William Feng Zhu Clark Thomborson

With the rapid development of the internet, copying a digital document is so easy and economically affordable that digital piracy is rampant. As a result, software protection has become a vital issue in current computer industry and a hot research topic. Software watermarking and obfuscation are techniques to protect software from unauthorized access, modification, and tampering. While software...

Journal: :CoRR 2012
Gorjan Alagic Stacey Jeffery Stephen P. Jordan

A circuit obfuscator is an algorithm that translates logic circuits into functionally-equivalent similarlysized logic circuits that are hard to understand. While ad hoc obfuscators exist, theoretical progress has mainly been limited to no-go results. In this work, we propose a new notion of circuit obfuscation, which we call partial indistinguishability. We then prove that, in contrast to previ...

Journal: :IACR Cryptology ePrint Archive 2015
Nir Bitansky Omer Paneth Daniel Wichs

We construct trapdoor permutations based on (sub-exponential) indistinguishability obfuscation and oneway functions, thereby providing the first candidate that is not based on the hardness of factoring. Our construction shows that even highly structured primitives, such as trapdoor permutations, can be potentially based on hardness assumptions with noisy structures such as those used in candida...

2016
Martin Potthast Matthias Hagen Benno Stein

We report on the first large-scale evaluation of author obfuscation approaches built to attack authorship verification approaches: the impact of 3 obfuscators on the performance of a total of 44 authorship verification approaches has been measured and analyzed. The best-performing obfuscator successfully impacts the decision-making process of the authorship verifiers on average in about 47% of ...

2016
Lorenzo Cavallaro

Malicious software, also known as malware, represents the profitable art of destruction, as it is able to do any kind of harm to a system in a stealthy manner as well as to hide its existence. Furthermore, its rise has prevailed and there is no end in sight. Its most valuable tool, obfuscation, is mainly responsible for this achievement. Obfuscation techniques are applied to protect assets of m...

2014
Terence Chen Roksana Boreli Mohamed Ali Kâafar Arik Friedman

Data obfuscation is a well-known technique for protecting user privacy against inference attacks, and it was studied in diverse settings, including search queries, recommender systems, location-based services and Online Social Networks (OSNs). However, these studies typically take the point of view of a single user who applies obfuscation, and focus on protection of a single target attribute. U...

2014
Elette Boyle Kai-Min Chung Rafael Pass

We initiate the study of extractability obfuscation (a.k.a. differing-inputs obfuscation), a notion first suggested by Barak et al. (JACM 2012): An extractability obfuscator eO for a class of algorithmsM guarantees that if an efficient attacker A can distinguish between obfuscations eO(M1), eO(M2) of two algorithms M1,M2 ∈M, then A can efficiently recover (given M1 and M2) an input on which M1 ...

2003
Nikolay P. Varnovsky Vladimir A. Zakharov

By obfuscation we mean any efficient semantic-preserving transformation of computer programs aimed at bringing a program into such a form, which impedes the understanding of its algorithm and data structures or prevents the extracting of some valuable information from the plaintext of a program. The main difficulty in designing an effective program obfuscator is to guarantee security, i.e. to p...

2003
Mihai Christodorescu Somesh Jha

Malicious code detection is a crucial component of any defense mechanism. In this paper, we present a unique viewpoint on malicious code detection. We regard malicious code detection as an obfuscation-deobfuscation game between malicious code writers and researchers working on malicious code detection. Malicious code writers attempt to obfuscate the malicious code to subvert the malicious code ...

2007
Shlomo Berkovsky Nikita Borisov Yaniv Eytani Tsvi Kuflik Francesco Ricci

Privacy hazard to Web-based information services represents an important obstacle to the growth and diffusion of the personalized services. Data obfuscation methods were proposed for enhancing the users’ privacy in recommender systems based on collaborative filtering. Data obfuscation can provide statistically measurable privacy gains. However, these are measured using metrics that may not be n...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید