Literatura académica sobre el tema "Obfuscations"
Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros
Consulte las listas temáticas de artículos, libros, tesis, actas de conferencias y otras fuentes académicas sobre el tema "Obfuscations".
Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.
También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.
Artículos de revistas sobre el tema "Obfuscations"
Nawaz, Umair, Muhammad Aleem y Jerry Chun-Wei Lin. "On the evaluation of android malware detectors against code-obfuscation techniques". PeerJ Computer Science 8 (21 de junio de 2022): e1002. http://dx.doi.org/10.7717/peerj-cs.1002.
Texto completoVarnovskiy, N. P., V. A. Zakharov, N. N. Kuzyurin y A. V. Shokurov. "The current state of art in program obfuscations: definitions of obfuscation security". Programming and Computer Software 41, n.º 6 (noviembre de 2015): 361–72. http://dx.doi.org/10.1134/s0361768815060079.
Texto completoKessler, Samuel J. y Timothy L. Parrish. "Old Obfuscations and New Conversations". Philip Roth Studies 18, n.º 1 (2022): 3–10. http://dx.doi.org/10.1353/prs.2022.0002.
Texto completoZhao, Yujie, Zhanyong Tang, Guixin Ye, Xiaoqing Gong y Dingyi Fang. "Input-Output Example-Guided Data Deobfuscation on Binary". Security and Communication Networks 2021 (13 de diciembre de 2021): 1–16. http://dx.doi.org/10.1155/2021/4646048.
Texto completoLedesma, Alberto. "On the Grammar of Silence: The Structure of My Undocumented Immigrant Writer's Block". Harvard Educational Review 85, n.º 3 (1 de septiembre de 2015): 415–26. http://dx.doi.org/10.17763/0017-8055.85.3.415.
Texto completoAlam, Shahid y Ibrahim Sogukpinar. "DroidClone: Attack of the android malware clones - a step towards stopping them". Computer Science and Information Systems, n.º 00 (2020): 35. http://dx.doi.org/10.2298/csis200330035a.
Texto completoKapse, Gunjan y Aruna Gupta. "Testing Android Anti-Malware against Malware Obfuscations". International Journal of Computer Applications 111, n.º 17 (18 de febrero de 2015): 6–9. http://dx.doi.org/10.5120/19755-1140.
Texto completoRoundy, Kevin A. y Barton P. Miller. "Binary-code obfuscations in prevalent packer tools". ACM Computing Surveys 46, n.º 1 (octubre de 2013): 1–32. http://dx.doi.org/10.1145/2522968.2522972.
Texto completoChawdhary, Aziem, Ranjeet Singh y Andy King. "Partial evaluation of string obfuscations for Java malware detection". Formal Aspects of Computing 29, n.º 1 (19 de febrero de 2016): 33–55. http://dx.doi.org/10.1007/s00165-016-0357-3.
Texto completoSewak, Mohit, Sanjay K. Sahay y Hemant Rathore. "DRLDO A Novel DRL based De obfuscation System for Defence Against Metamorphic Malware". Defence Science Journal 71, n.º 1 (1 de febrero de 2021): 55–65. http://dx.doi.org/10.14429/dsj.71.15780.
Texto completoTesis sobre el tema "Obfuscations"
Homoliak, Ivan. "Detekce Útoků v Síťovém Provozu". Doctoral thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2016. http://www.nusl.cz/ntk/nusl-261231.
Texto completoBatchelder, Michael Robert. "Java bytecode obfuscation". Thesis, McGill University, 2007. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=18300.
Texto completoLes programmes écrits pour l'exécution d'ordinateur seront toujours susceptibles au vol d'information. Cette information peut inclure des algorithmes de marque de commerce, des données incluses dans le programme, ou même des données concernant les accès de programme. Suivant les avancées technologiques, les informaticiens construisent des outils de plus en plus puissants pour l'ingénierie inverse telle que le décompilateur. Le langage de programmation de Java est particulièrement ouvert aux attaques de l'ingénierie inverse en raison de son format binaire bien défini, ouvert, et portatif. Nous recherches portent sur un domaine permettant de mieux sécuriser fixer la propriété intellectuelle des programmes en Java; obscurcissement. L'obscurcissement d'un programme implique de transformer le code du programme en une représentation plus complexe mais sémantiquement équivalente. Ceci peut inclure l'addition de l'écoulement embrouillant de commande, de la supression de certaines informations incluses dans les programmes dont l'exécution n'est pas spécifiquement exigée, ou de la dissimulation des données. Excepté les techniques cryptologique s, l'obscurcissement est l'une des seules techniques disponibles. Même si beaucoup de stratégies de l'obscurissment sont finalement réversibles, il gêne sérieusement ceux qui essayent de voler l'information en augmentant la durée de calcul et la puissance exigées par les logicels d'ingénierie inverse et augmente considérablement la complexité de n'importe quel code source récupere par cette technique. Dans cette thèse nous présentons un certain nombre de transformations d'obscurcissement mises en application dans un outil automatique que nous appelons le Java Bytecode Obfuscator (JBCO). Nous présentons des mesures empiriques des coûts d'exécution de ces transformations en termes de vitesse d'exécution et taille de programme. Des mesures de complexité qui mesurent l'efficacité des obscurc
ARVIDSSON, OSKAR. "Platform Independent Code Obfuscation". Thesis, KTH, Skolan för datavetenskap och kommunikation (CSC), 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-146986.
Texto completoKodobfuskering är ett verktyg för att göra mjukvara svårare att läsa, förstå och bakåtkompilera. Det an- vänds inom industrin för att skydda proprietära algo- ritmer samt för att skydda program och tjänster från att missbrukas. De lösningar som finns att tillgå idag är dock ofta beroende av en eller flera specifika platt- formar. I den här rapporten undersöker vi möjlighe- ten att göra plattformsoberoende obfuskering. Resul- tatet är en undersökning av vilka obfuskeringsmeto- der som finns tillgängliga, samt en djupare studie av några av dessa. Den djupare studien ger, för var och en av de studerade metoderna, insikter om hur svåra de är att deobfuskera för hand, hur svåra de är att deobfuskera automatiskt, hur pass svårt det är att skilja den obfuskerade koden från den oobfuskerade, samt hur lätt det är att implementera och integrera dem i en kompileringskedja.
ARVIDSSON, OSKAR. "Platform Independent Code Obfuscation". Thesis, KTH, Skolan för datavetenskap och kommunikation (CSC), 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-142031.
Texto completoVaria, Mayank (Mayank Harshad). "Studies in program obfuscation". Thesis, Massachusetts Institute of Technology, 2010. http://hdl.handle.net/1721.1/64489.
Texto completoThis electronic version was submitted by the student author. The certified thesis is available in the Institute Archives and Special Collections.
Cataloged from student submitted PDF version of thesis.
Includes bibliographical references (p. 159-164).
Program obfuscation is the software analog to the problem of tamper-proofing hardware. The goal of program obfuscation is to construct a compiler, called an "obfuscator," that garbles the code of a computer program while maintaining its functionality. Commercial products exist to perform this procedure, but they do not provide a rigorous security guarantee. Over the past decade, program obfuscation has been studied by the theoretical cryptography community, where rigorous definitions of security have been proposed and obfuscators have been constructed for some families of programs. This thesis presents three contributions based on the virtual black-box security definition of Barak et al [10]. First, we show tight connections between obfuscation and symmetric-key encryption. Specifically, obfuscation can be used to construct an encryption scheme with strong leakage resilience and key-dependent message security. The converse is also true, and these connections scale with the level of security desired. As a result, the known constructions and impossibility results for each primitive carry over to the other. Second, we present two new security definitions that augment the virtual black-box property to incorporate non-malleability. The virtual black-box definition does not prevent an adversary from modifying an obfuscated program intelligently. By contrast, our new definitions provide software with the same security guarantees as tamper-proof and tamper-evident hardware, respectively. The first definition prohibits tampering, and the second definition requires that tampering is detectable after the fact. We construct non-malleable obfuscators of both favors for some program families of interest. Third, we present an obfuscator for programs that test for membership in a hyperplane. This generalizes prior works that obfuscate equality testing. We prove the security of the obfuscator under a new strong variant of the Decisional Diffie-Hellman assumption that holds in the generic group model. Additionally, we show a cryptographic application of the new obfuscator to leak-ageresilient one-time digital signatures. The thesis also includes a survey of the prior results in the field.
by Mayank Varia.
Ph.D.
KUMAR, AMIT. "CONTROL FLOW OBFUSCATION COMPLEXITY". University of Cincinnati / OhioLINK, 2005. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1116221965.
Texto completoDuchene, Julien. "Développement et évaluation d'obfuscations de protocoles basées sur la spécification". Electronic Thesis or Diss., Toulouse, INSA, 2018. http://www.theses.fr/2018ISAT0054.
Texto completoThere are more and more protocols. Many of them have their specification available for interoperability purpose for instance. However, when it comes to intellectual property, this specification is kept secret. Attackers might use a wrongly implemented protocol to compromise a system, if he has access to the specification, it’s attack would be far more efficient. Even if he does not have access to the specification, he can reverse-engine it. Thus, create protocols hard to reverse is interesting. In this thesis, we develop a novel approach of protocol protections to make protocol reverse engineering more complex. We apply some obfuscations on protocol message format, furthermore, we do it automatically from the original protocol specification. Firstly, we have analyzed more than 30 different contributions of protocol reverse engineering tools. We retrieved the following elements : 1) Protocol reverse engineering tools try to infer regular models ; 2) They suppose that the parsing is done from left to right ; 3) They delimit fields based on well-known delimiters or with ad-hoc techniques ; 4) They cluster messages based on pattern similarity measures. Thus, to make protocol reverse harder, one can create protocols which does not respect theses statements. Secondly, we have proposed a model of message format on which obfuscations can be applied. With this model, we also provide some atomic obfuscations which can be composed. Each obfuscation target one or more protocol reverse engineering hypothesis. Obfuscation composition ensures effectiveness of our solution and makes protocol reverse-engineering more complex. This model is used to automatically generate code for parser, serializer and accessors. This solution is implemented into a framework we called ProtoObf. ProtoObf is used to evaluate obfuscations performance. Results show an increase of protocol complexity with the number of obfuscation composition while costs (particularly the serialized buffer size) stay low
Chakraborty, Rajat Subhra. "Hardware Security through Design Obfuscation". Cleveland, Ohio : Case Western Reserve University, 2010. http://rave.ohiolink.edu/etdc/view?acc_num=case1270133481.
Texto completoDepartment of EECS - Computer Engineering Title from PDF (viewed on 2010-05-25) Includes abstract Includes bibliographical references and appendices Available online via the OhioLINK ETD Center
Drape, Stephen. "Obfuscation of abstract data-types". Thesis, University of Oxford, 2004. http://ora.ox.ac.uk/objects/uuid:fa574ce9-4ed2-41f5-86d8-78113828b9ab.
Texto completoSethi, Amit. "Digital Rights Management and Code Obfuscation". Thesis, University of Waterloo, 2004. http://hdl.handle.net/10012/1012.
Texto completoLibros sobre el tema "Obfuscations"
Puzzles, perplexities & obfuscations. New York: Sterling Pub. Co., 1992.
Buscar texto completoHorváth, Máté y Levente Buttyán. Cryptographic Obfuscation. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-319-98041-6.
Texto completoForte, Domenic, Swarup Bhunia y Mark M. Tehranipoor, eds. Hardware Protection through Obfuscation. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-49019-9.
Texto completoWaddell, Suzanne. Freedom of information: Accountability or obfuscation? Heidelberg, Victoria, Australia: Heidelberg Press, 2009.
Buscar texto completo1980-, Mlinarcik Theresa, ed. The offbeat--eschew obfuscation: A literary collection. East Lansing: Michigan State University Press, 2003.
Buscar texto completoCassidy's guide to everyday etiquette (and obfuscation). New York: Alfred A. Knopf, 2015.
Buscar texto completoEllison, Glenn. Search, obfuscation, and price elasticities on the Internet. Cambridge, Mass: National Bureau of Economic Research, 2004.
Buscar texto completoEllison, Glenn. Search, obfuscation, and price elasticities on the Internet. Cambridge, MA: Massachusetts Institute of Technology, Dept. of Economics, 2004.
Buscar texto completoEllison, Glenn. Search, obfuscation, and price elasticities on the internet. Cambridge, MA: National Bureau of Economic Research, 2004.
Buscar texto completoJasvir, Nagra, ed. Surreptitious software: Obfuscation, watermarking, and tamperproofing for program protection. Upper Saddle River, NJ: Addison-Wesley, 2009.
Buscar texto completoCapítulos de libros sobre el tema "Obfuscations"
Tobias, Michael Charles. "Obfuscations". En Codex Orféo, 91–97. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-30622-3_35.
Texto completoCesare, Silvio y Yang Xiang. "Program Transformations and Obfuscations". En Software Similarity and Classification, 17–28. London: Springer London, 2012. http://dx.doi.org/10.1007/978-1-4471-2909-7_3.
Texto completoMajumdar, Anirban, Clark Thomborson y Stephen Drape. "A Survey of Control-Flow Obfuscations". En Information Systems Security, 353–56. Berlin, Heidelberg: Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11961635_26.
Texto completoZhang, Xuetao, Jinshuang Wang, Meng Sun y Yao Feng. "AndrOpGAN: An Opcode GAN for Android Malware Obfuscations". En Machine Learning for Cyber Security, 12–25. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-62223-7_2.
Texto completoGiacobazzi, Roberto y Isabella Mastroeni. "Property-Driven Code Obfuscations Reinterpreting Jones-Optimality in Abstract Interpretation". En Static Analysis, 247–71. Cham: Springer Nature Switzerland, 2022. http://dx.doi.org/10.1007/978-3-031-22308-2_12.
Texto completoCheon, Jung Hee, Minki Hhan, Jiseung Kim y Changmin Lee. "Cryptanalyses of Branching Program Obfuscations over GGH13 Multilinear Map from the NTRU Problem". En Lecture Notes in Computer Science, 184–210. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-96878-0_7.
Texto completoHwang, Shin-Jia y Tzu-Ping Chen. "A Detector Using Variant Stacked Denoising Autoencoders with Logistic Regression for Malicious JavaScript with Obfuscations". En Communications in Computer and Information Science, 374–86. Singapore: Springer Nature Singapore, 2022. http://dx.doi.org/10.1007/978-981-19-9582-8_33.
Texto completoHorváth, Máté y Levente Buttyán. "Introduction". En Cryptographic Obfuscation, 1–10. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-319-98041-6_1.
Texto completoHorváth, Máté y Levente Buttyán. "Background". En Cryptographic Obfuscation, 11–28. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-319-98041-6_2.
Texto completoHorváth, Máté y Levente Buttyán. "Definitional Approaches". En Cryptographic Obfuscation, 29–36. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-319-98041-6_3.
Texto completoActas de conferencias sobre el tema "Obfuscations"
Majumdar, Anirban, Stephen J. Drape y Clark D. Thomborson. "Slicing obfuscations". En the 2007 ACM workshop. New York, New York, USA: ACM Press, 2007. http://dx.doi.org/10.1145/1314276.1314290.
Texto completoMajumdar, Anirban, Stephen Drape y Clark Thomborson. "Metrics-based Evaluation of Slicing Obfuscations". En Third International Symposium on Information Assurance and Security. IEEE, 2007. http://dx.doi.org/10.1109/isias.2007.4299819.
Texto completoMajumdar, Anirban, Stephen Drape y Clark Thomborson. "Metrics-based Evaluation of Slicing Obfuscations". En Third International Symposium on Information Assurance and Security. IEEE, 2007. http://dx.doi.org/10.1109/ias.2007.50.
Texto completoKarfa, Chandan, TM Abdul Khader, Yom Nigam, Ramanuj Chouksey y Ramesh Karri. "HOST: HLS Obfuscations against SMT ATtack". En 2021 Design, Automation & Test in Europe Conference & Exhibition (DATE). IEEE, 2021. http://dx.doi.org/10.23919/date51398.2021.9473927.
Texto completoCapiluppi, Andrea, Paolo Falcarin y Cornelia Boldyreff. "Code Defactoring: Evaluating the Effectiveness of Java Obfuscations". En 2012 19th Working Conference on Reverse Engineering (WCRE). IEEE, 2012. http://dx.doi.org/10.1109/wcre.2012.17.
Texto completoHammad, Mahmoud, Joshua Garcia y Sam Malek. "A large-scale empirical study on the effects of code obfuscations on Android apps and anti-malware products". En ICSE '18: 40th International Conference on Software Engineering. New York, NY, USA: ACM, 2018. http://dx.doi.org/10.1145/3180155.3180228.
Texto completoTianbo Huang, Chengyang Li, Xiarun Chen, Chenglin Xie y Weiping Wen. "iOLLVM: Enhanced Version of OLLVM". En 9th International Conference on Artificial Intelligence and Applications (AIAP 2022). Academy and Industry Research Collaboration Center (AIRCC), 2022. http://dx.doi.org/10.5121/csit.2022.120409.
Texto completoFioretto, Ferdinando, Terrence W. K. Mak y Pascal Van Hentenryck. "Privacy-Preserving Obfuscation of Critical Infrastructure Networks". En Twenty-Eighth International Joint Conference on Artificial Intelligence {IJCAI-19}. California: International Joint Conferences on Artificial Intelligence Organization, 2019. http://dx.doi.org/10.24963/ijcai.2019/152.
Texto completoOllivier, Mathilde, Sébastien Bardin, Richard Bonichon y Jean-Yves Marion. "Obfuscation". En the 9th Workshop. New York, New York, USA: ACM Press, 2019. http://dx.doi.org/10.1145/3371307.3371309.
Texto completoWang, Pei, Shuai Wang, Jiang Ming, Yufei Jiang y Dinghao Wu. "Translingual Obfuscation". En 2016 IEEE European Symposium on Security and Privacy (EuroS&P). IEEE, 2016. http://dx.doi.org/10.1109/eurosp.2016.21.
Texto completoInformes sobre el tema "Obfuscations"
Campbell, Philip LaRoche. An introduction to software obfuscation. Office of Scientific and Technical Information (OSTI), junio de 2004. http://dx.doi.org/10.2172/919159.
Texto completoEllison, Glenn y Alexander Wolitzky. A Search Cost Model of Obfuscation. Cambridge, MA: National Bureau of Economic Research, agosto de 2009. http://dx.doi.org/10.3386/w15237.
Texto completoEllison, Glenn y Sara Fisher Ellison. Search, Obfuscation, and Price Elasticities on the Internet. Cambridge, MA: National Bureau of Economic Research, junio de 2004. http://dx.doi.org/10.3386/w10570.
Texto completoAnderson, William Erik. On the secure obfuscation of deterministic finite automata. Office of Scientific and Technical Information (OSTI), junio de 2008. http://dx.doi.org/10.2172/974399.
Texto completoKoushanfar, F. y J. Kong. IC Piracy Protection by APUF and Logic Obfuscation. Fort Belvoir, VA: Defense Technical Information Center, enero de 2014. http://dx.doi.org/10.21236/ada597856.
Texto completoCarlin, Bruce Ian y Gustavo Manso. Obfuscation, Learning, and the Evolution of Investor Sophistication. Cambridge, MA: National Bureau of Economic Research, mayo de 2009. http://dx.doi.org/10.3386/w14954.
Texto completoSolis, John. A flexible framework for secure and efficient program obfuscation. Office of Scientific and Technical Information (OSTI), marzo de 2013. http://dx.doi.org/10.2172/1096167.
Texto completoLakhotia, Arun y Vir V. Phoha. (DEPSCOR FY 09) Obfuscation and Deobfuscation of Intent of Computer Programs. Fort Belvoir, VA: Defense Technical Information Center, diciembre de 2012. http://dx.doi.org/10.21236/ada583338.
Texto completoCrispin, Darla. Artistic Research as a Process of Unfolding. Norges Musikkhøgskole, agosto de 2018. http://dx.doi.org/10.22501/nmh-ar.503395.
Texto completoZarate, Carolina, Simson L. Garfinkel, Aubin Heffernan, Kyle Gorak y Scott Horras. A Survey of XOR as a Digital Obfuscation Technique in a Corpus of Real Data. Fort Belvoir, VA: Defense Technical Information Center, enero de 2014. http://dx.doi.org/10.21236/ada592678.
Texto completo