نتایج جستجو برای: obfuscation

تعداد نتایج: 1527  

Journal: : 2023

Purpose of the paper: a search for rather abstract representation PowerShell script functionality using syntax trees such that an invisible obfuscated can be detected provided associated is already known malware. Research method: obfuscation analysis performed on three types obfuscation: token, string, and tree. The obtained result: 1) we have found simple AST-based features, as number AST func...

Journal: :CoRR 2017
Arvind Narayanan Malte Möser

In the cryptographic currency Bitcoin, all transactions are recorded in the blockchain — a public, global, and immutable ledger. Because transactions are public, Bitcoin and its users employ obfuscation to maintain a degree of financial privacy. Critically, and in contrast to typical uses of obfuscation, in Bitcoin obfuscation is not aimed against the system designer but is instead enabled by d...

2009
Ying Zeng Fenlin Liu Xiangyang Luo Chunfang Yang

Code obfuscation can alter the syntactic properties of malware byte sequences without significantly affecting their execution behaviors. Thus it can easily foil signature-based detection. In this paper, the ability of handling obfuscation transformations of the semanticsbased malware detection algorithm MOM A proposed by Gao et al. is discussed using abstract interpretation theory from a semant...

Journal: :IACR Cryptology ePrint Archive 2015
Christina Brzuska Arno Mittelbach

Universal Computational Extractors (UCEs), introduced by Bellare, Hoang and Keelveedhi (CRYPTO 2013), are a framework of assumptions on hash functions that allow to instantiate random oracles in a large variety of settings. Brzuska, Farshim and Mittelbach (CRYPTO 2014) showed that a large class of UCE assumptions with computationally unpredictable sources cannot be achieved, if indistinguishabi...

Journal: :IACR Cryptology ePrint Archive 2015
Nir Bitansky Vinod Vaikuntanathan

We show general transformations from subexponentially-secure approximate indistinguishability obfuscation (IO) where the obfuscated circuit agrees with the original circuit on a 1/2 + fraction of inputs on a certain samplable distribution, into exact indistinguishability obfuscation where the obfuscated circuit and the original circuit agree on all inputs. As a step towards our results, which i...

2016
Fatemeh Mashhadirajab Mehrnoush Shamsfard

In this paper, we describe our text alignment algorithm that achieved the first rank in Persian Plagdet 2016 competition. The Persian Plagdet corpus includes several obfuscation strategies. Information about the type of obfuscation helps plagiarism detection systems to use their most suitable algorithm for each type. For this purpose, we use SVM neural network for classification of documents ac...

2013
Boaz Barak Sanjam Garg Yael Tauman Kalai Omer Paneth Amit Sahai

The goal of general-purpose program obfuscation is to make an arbitrary computer program “unintelligible” while preserving its functionality. At least as far back as the work of Diffie and Hellman in 1976, researchers have contemplated applications of general-purpose obfuscation. However, until 2013, even heuristic constructions for general-purpose obfuscation were not known. This changed with ...

2003
Mihai Christodorescu Somesh Jha

Malicious code detection is a crucial component of any defense mechanism. In this paper, we present a unique viewpoint on malicious code detection. We regard malicious code detection as an obfuscation-deobfuscation game between malicious code writers and researchers working on malicious code detection. Malicious code writers attempt to obfuscate the malicious code to subvert the malicious code ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید