Добірка наукової літератури з теми "Obfuscations"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся зі списками актуальних статей, книг, дисертацій, тез та інших наукових джерел на тему "Obfuscations".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Статті в журналах з теми "Obfuscations"
Nawaz, Umair, Muhammad Aleem, and Jerry Chun-Wei Lin. "On the evaluation of android malware detectors against code-obfuscation techniques." PeerJ Computer Science 8 (June 21, 2022): e1002. http://dx.doi.org/10.7717/peerj-cs.1002.
Повний текст джерелаVarnovskiy, N. P., V. A. Zakharov, N. N. Kuzyurin, and A. V. Shokurov. "The current state of art in program obfuscations: definitions of obfuscation security." Programming and Computer Software 41, no. 6 (November 2015): 361–72. http://dx.doi.org/10.1134/s0361768815060079.
Повний текст джерелаKessler, Samuel J., and Timothy L. Parrish. "Old Obfuscations and New Conversations." Philip Roth Studies 18, no. 1 (2022): 3–10. http://dx.doi.org/10.1353/prs.2022.0002.
Повний текст джерелаZhao, Yujie, Zhanyong Tang, Guixin Ye, Xiaoqing Gong, and Dingyi Fang. "Input-Output Example-Guided Data Deobfuscation on Binary." Security and Communication Networks 2021 (December 13, 2021): 1–16. http://dx.doi.org/10.1155/2021/4646048.
Повний текст джерелаLedesma, Alberto. "On the Grammar of Silence: The Structure of My Undocumented Immigrant Writer's Block." Harvard Educational Review 85, no. 3 (September 1, 2015): 415–26. http://dx.doi.org/10.17763/0017-8055.85.3.415.
Повний текст джерелаAlam, Shahid, and Ibrahim Sogukpinar. "DroidClone: Attack of the android malware clones - a step towards stopping them." Computer Science and Information Systems, no. 00 (2020): 35. http://dx.doi.org/10.2298/csis200330035a.
Повний текст джерелаKapse, Gunjan, and Aruna Gupta. "Testing Android Anti-Malware against Malware Obfuscations." International Journal of Computer Applications 111, no. 17 (February 18, 2015): 6–9. http://dx.doi.org/10.5120/19755-1140.
Повний текст джерелаRoundy, Kevin A., and Barton P. Miller. "Binary-code obfuscations in prevalent packer tools." ACM Computing Surveys 46, no. 1 (October 2013): 1–32. http://dx.doi.org/10.1145/2522968.2522972.
Повний текст джерелаChawdhary, Aziem, Ranjeet Singh, and Andy King. "Partial evaluation of string obfuscations for Java malware detection." Formal Aspects of Computing 29, no. 1 (February 19, 2016): 33–55. http://dx.doi.org/10.1007/s00165-016-0357-3.
Повний текст джерелаSewak, Mohit, Sanjay K. Sahay, and Hemant Rathore. "DRLDO A Novel DRL based De obfuscation System for Defence Against Metamorphic Malware." Defence Science Journal 71, no. 1 (February 1, 2021): 55–65. http://dx.doi.org/10.14429/dsj.71.15780.
Повний текст джерелаДисертації з теми "Obfuscations"
Homoliak, Ivan. "Detekce Útoků v Síťovém Provozu." Doctoral thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2016. http://www.nusl.cz/ntk/nusl-261231.
Повний текст джерелаBatchelder, Michael Robert. "Java bytecode obfuscation." Thesis, McGill University, 2007. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=18300.
Повний текст джерелаLes programmes écrits pour l'exécution d'ordinateur seront toujours susceptibles au vol d'information. Cette information peut inclure des algorithmes de marque de commerce, des données incluses dans le programme, ou même des données concernant les accès de programme. Suivant les avancées technologiques, les informaticiens construisent des outils de plus en plus puissants pour l'ingénierie inverse telle que le décompilateur. Le langage de programmation de Java est particulièrement ouvert aux attaques de l'ingénierie inverse en raison de son format binaire bien défini, ouvert, et portatif. Nous recherches portent sur un domaine permettant de mieux sécuriser fixer la propriété intellectuelle des programmes en Java; obscurcissement. L'obscurcissement d'un programme implique de transformer le code du programme en une représentation plus complexe mais sémantiquement équivalente. Ceci peut inclure l'addition de l'écoulement embrouillant de commande, de la supression de certaines informations incluses dans les programmes dont l'exécution n'est pas spécifiquement exigée, ou de la dissimulation des données. Excepté les techniques cryptologique s, l'obscurcissement est l'une des seules techniques disponibles. Même si beaucoup de stratégies de l'obscurissment sont finalement réversibles, il gêne sérieusement ceux qui essayent de voler l'information en augmentant la durée de calcul et la puissance exigées par les logicels d'ingénierie inverse et augmente considérablement la complexité de n'importe quel code source récupere par cette technique. Dans cette thèse nous présentons un certain nombre de transformations d'obscurcissement mises en application dans un outil automatique que nous appelons le Java Bytecode Obfuscator (JBCO). Nous présentons des mesures empiriques des coûts d'exécution de ces transformations en termes de vitesse d'exécution et taille de programme. Des mesures de complexité qui mesurent l'efficacité des obscurc
ARVIDSSON, OSKAR. "Platform Independent Code Obfuscation." Thesis, KTH, Skolan för datavetenskap och kommunikation (CSC), 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-146986.
Повний текст джерелаKodobfuskering är ett verktyg för att göra mjukvara svårare att läsa, förstå och bakåtkompilera. Det an- vänds inom industrin för att skydda proprietära algo- ritmer samt för att skydda program och tjänster från att missbrukas. De lösningar som finns att tillgå idag är dock ofta beroende av en eller flera specifika platt- formar. I den här rapporten undersöker vi möjlighe- ten att göra plattformsoberoende obfuskering. Resul- tatet är en undersökning av vilka obfuskeringsmeto- der som finns tillgängliga, samt en djupare studie av några av dessa. Den djupare studien ger, för var och en av de studerade metoderna, insikter om hur svåra de är att deobfuskera för hand, hur svåra de är att deobfuskera automatiskt, hur pass svårt det är att skilja den obfuskerade koden från den oobfuskerade, samt hur lätt det är att implementera och integrera dem i en kompileringskedja.
ARVIDSSON, OSKAR. "Platform Independent Code Obfuscation." Thesis, KTH, Skolan för datavetenskap och kommunikation (CSC), 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-142031.
Повний текст джерелаVaria, Mayank (Mayank Harshad). "Studies in program obfuscation." Thesis, Massachusetts Institute of Technology, 2010. http://hdl.handle.net/1721.1/64489.
Повний текст джерелаThis electronic version was submitted by the student author. The certified thesis is available in the Institute Archives and Special Collections.
Cataloged from student submitted PDF version of thesis.
Includes bibliographical references (p. 159-164).
Program obfuscation is the software analog to the problem of tamper-proofing hardware. The goal of program obfuscation is to construct a compiler, called an "obfuscator," that garbles the code of a computer program while maintaining its functionality. Commercial products exist to perform this procedure, but they do not provide a rigorous security guarantee. Over the past decade, program obfuscation has been studied by the theoretical cryptography community, where rigorous definitions of security have been proposed and obfuscators have been constructed for some families of programs. This thesis presents three contributions based on the virtual black-box security definition of Barak et al [10]. First, we show tight connections between obfuscation and symmetric-key encryption. Specifically, obfuscation can be used to construct an encryption scheme with strong leakage resilience and key-dependent message security. The converse is also true, and these connections scale with the level of security desired. As a result, the known constructions and impossibility results for each primitive carry over to the other. Second, we present two new security definitions that augment the virtual black-box property to incorporate non-malleability. The virtual black-box definition does not prevent an adversary from modifying an obfuscated program intelligently. By contrast, our new definitions provide software with the same security guarantees as tamper-proof and tamper-evident hardware, respectively. The first definition prohibits tampering, and the second definition requires that tampering is detectable after the fact. We construct non-malleable obfuscators of both favors for some program families of interest. Third, we present an obfuscator for programs that test for membership in a hyperplane. This generalizes prior works that obfuscate equality testing. We prove the security of the obfuscator under a new strong variant of the Decisional Diffie-Hellman assumption that holds in the generic group model. Additionally, we show a cryptographic application of the new obfuscator to leak-ageresilient one-time digital signatures. The thesis also includes a survey of the prior results in the field.
by Mayank Varia.
Ph.D.
KUMAR, AMIT. "CONTROL FLOW OBFUSCATION COMPLEXITY." University of Cincinnati / OhioLINK, 2005. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1116221965.
Повний текст джерелаDuchene, Julien. "Développement et évaluation d'obfuscations de protocoles basées sur la spécification." Electronic Thesis or Diss., Toulouse, INSA, 2018. http://www.theses.fr/2018ISAT0054.
Повний текст джерелаThere are more and more protocols. Many of them have their specification available for interoperability purpose for instance. However, when it comes to intellectual property, this specification is kept secret. Attackers might use a wrongly implemented protocol to compromise a system, if he has access to the specification, it’s attack would be far more efficient. Even if he does not have access to the specification, he can reverse-engine it. Thus, create protocols hard to reverse is interesting. In this thesis, we develop a novel approach of protocol protections to make protocol reverse engineering more complex. We apply some obfuscations on protocol message format, furthermore, we do it automatically from the original protocol specification. Firstly, we have analyzed more than 30 different contributions of protocol reverse engineering tools. We retrieved the following elements : 1) Protocol reverse engineering tools try to infer regular models ; 2) They suppose that the parsing is done from left to right ; 3) They delimit fields based on well-known delimiters or with ad-hoc techniques ; 4) They cluster messages based on pattern similarity measures. Thus, to make protocol reverse harder, one can create protocols which does not respect theses statements. Secondly, we have proposed a model of message format on which obfuscations can be applied. With this model, we also provide some atomic obfuscations which can be composed. Each obfuscation target one or more protocol reverse engineering hypothesis. Obfuscation composition ensures effectiveness of our solution and makes protocol reverse-engineering more complex. This model is used to automatically generate code for parser, serializer and accessors. This solution is implemented into a framework we called ProtoObf. ProtoObf is used to evaluate obfuscations performance. Results show an increase of protocol complexity with the number of obfuscation composition while costs (particularly the serialized buffer size) stay low
Chakraborty, Rajat Subhra. "Hardware Security through Design Obfuscation." Cleveland, Ohio : Case Western Reserve University, 2010. http://rave.ohiolink.edu/etdc/view?acc_num=case1270133481.
Повний текст джерелаDepartment of EECS - Computer Engineering Title from PDF (viewed on 2010-05-25) Includes abstract Includes bibliographical references and appendices Available online via the OhioLINK ETD Center
Drape, Stephen. "Obfuscation of abstract data-types." Thesis, University of Oxford, 2004. http://ora.ox.ac.uk/objects/uuid:fa574ce9-4ed2-41f5-86d8-78113828b9ab.
Повний текст джерелаSethi, Amit. "Digital Rights Management and Code Obfuscation." Thesis, University of Waterloo, 2004. http://hdl.handle.net/10012/1012.
Повний текст джерелаКниги з теми "Obfuscations"
Puzzles, perplexities & obfuscations. New York: Sterling Pub. Co., 1992.
Знайти повний текст джерелаHorváth, Máté, and Levente Buttyán. Cryptographic Obfuscation. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-319-98041-6.
Повний текст джерелаForte, Domenic, Swarup Bhunia, and Mark M. Tehranipoor, eds. Hardware Protection through Obfuscation. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-49019-9.
Повний текст джерелаWaddell, Suzanne. Freedom of information: Accountability or obfuscation? Heidelberg, Victoria, Australia: Heidelberg Press, 2009.
Знайти повний текст джерела1980-, Mlinarcik Theresa, ed. The offbeat--eschew obfuscation: A literary collection. East Lansing: Michigan State University Press, 2003.
Знайти повний текст джерелаCassidy's guide to everyday etiquette (and obfuscation). New York: Alfred A. Knopf, 2015.
Знайти повний текст джерелаEllison, Glenn. Search, obfuscation, and price elasticities on the Internet. Cambridge, Mass: National Bureau of Economic Research, 2004.
Знайти повний текст джерелаEllison, Glenn. Search, obfuscation, and price elasticities on the Internet. Cambridge, MA: Massachusetts Institute of Technology, Dept. of Economics, 2004.
Знайти повний текст джерелаEllison, Glenn. Search, obfuscation, and price elasticities on the internet. Cambridge, MA: National Bureau of Economic Research, 2004.
Знайти повний текст джерелаJasvir, Nagra, ed. Surreptitious software: Obfuscation, watermarking, and tamperproofing for program protection. Upper Saddle River, NJ: Addison-Wesley, 2009.
Знайти повний текст джерелаЧастини книг з теми "Obfuscations"
Tobias, Michael Charles. "Obfuscations." In Codex Orféo, 91–97. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-30622-3_35.
Повний текст джерелаCesare, Silvio, and Yang Xiang. "Program Transformations and Obfuscations." In Software Similarity and Classification, 17–28. London: Springer London, 2012. http://dx.doi.org/10.1007/978-1-4471-2909-7_3.
Повний текст джерелаMajumdar, Anirban, Clark Thomborson, and Stephen Drape. "A Survey of Control-Flow Obfuscations." In Information Systems Security, 353–56. Berlin, Heidelberg: Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11961635_26.
Повний текст джерелаZhang, Xuetao, Jinshuang Wang, Meng Sun, and Yao Feng. "AndrOpGAN: An Opcode GAN for Android Malware Obfuscations." In Machine Learning for Cyber Security, 12–25. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-62223-7_2.
Повний текст джерелаGiacobazzi, Roberto, and Isabella Mastroeni. "Property-Driven Code Obfuscations Reinterpreting Jones-Optimality in Abstract Interpretation." In Static Analysis, 247–71. Cham: Springer Nature Switzerland, 2022. http://dx.doi.org/10.1007/978-3-031-22308-2_12.
Повний текст джерелаCheon, Jung Hee, Minki Hhan, Jiseung Kim, and Changmin Lee. "Cryptanalyses of Branching Program Obfuscations over GGH13 Multilinear Map from the NTRU Problem." In Lecture Notes in Computer Science, 184–210. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-96878-0_7.
Повний текст джерелаHwang, Shin-Jia, and Tzu-Ping Chen. "A Detector Using Variant Stacked Denoising Autoencoders with Logistic Regression for Malicious JavaScript with Obfuscations." In Communications in Computer and Information Science, 374–86. Singapore: Springer Nature Singapore, 2022. http://dx.doi.org/10.1007/978-981-19-9582-8_33.
Повний текст джерелаHorváth, Máté, and Levente Buttyán. "Introduction." In Cryptographic Obfuscation, 1–10. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-319-98041-6_1.
Повний текст джерелаHorváth, Máté, and Levente Buttyán. "Background." In Cryptographic Obfuscation, 11–28. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-319-98041-6_2.
Повний текст джерелаHorváth, Máté, and Levente Buttyán. "Definitional Approaches." In Cryptographic Obfuscation, 29–36. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-319-98041-6_3.
Повний текст джерелаТези доповідей конференцій з теми "Obfuscations"
Majumdar, Anirban, Stephen J. Drape, and Clark D. Thomborson. "Slicing obfuscations." In the 2007 ACM workshop. New York, New York, USA: ACM Press, 2007. http://dx.doi.org/10.1145/1314276.1314290.
Повний текст джерелаMajumdar, Anirban, Stephen Drape, and Clark Thomborson. "Metrics-based Evaluation of Slicing Obfuscations." In Third International Symposium on Information Assurance and Security. IEEE, 2007. http://dx.doi.org/10.1109/isias.2007.4299819.
Повний текст джерелаMajumdar, Anirban, Stephen Drape, and Clark Thomborson. "Metrics-based Evaluation of Slicing Obfuscations." In Third International Symposium on Information Assurance and Security. IEEE, 2007. http://dx.doi.org/10.1109/ias.2007.50.
Повний текст джерелаKarfa, Chandan, TM Abdul Khader, Yom Nigam, Ramanuj Chouksey, and Ramesh Karri. "HOST: HLS Obfuscations against SMT ATtack." In 2021 Design, Automation & Test in Europe Conference & Exhibition (DATE). IEEE, 2021. http://dx.doi.org/10.23919/date51398.2021.9473927.
Повний текст джерелаCapiluppi, Andrea, Paolo Falcarin, and Cornelia Boldyreff. "Code Defactoring: Evaluating the Effectiveness of Java Obfuscations." In 2012 19th Working Conference on Reverse Engineering (WCRE). IEEE, 2012. http://dx.doi.org/10.1109/wcre.2012.17.
Повний текст джерелаHammad, Mahmoud, Joshua Garcia, and Sam Malek. "A large-scale empirical study on the effects of code obfuscations on Android apps and anti-malware products." In ICSE '18: 40th International Conference on Software Engineering. New York, NY, USA: ACM, 2018. http://dx.doi.org/10.1145/3180155.3180228.
Повний текст джерелаTianbo Huang, Chengyang Li, Xiarun Chen, Chenglin Xie, and Weiping Wen. "iOLLVM: Enhanced Version of OLLVM." In 9th International Conference on Artificial Intelligence and Applications (AIAP 2022). Academy and Industry Research Collaboration Center (AIRCC), 2022. http://dx.doi.org/10.5121/csit.2022.120409.
Повний текст джерелаFioretto, Ferdinando, Terrence W. K. Mak, and Pascal Van Hentenryck. "Privacy-Preserving Obfuscation of Critical Infrastructure Networks." In Twenty-Eighth International Joint Conference on Artificial Intelligence {IJCAI-19}. California: International Joint Conferences on Artificial Intelligence Organization, 2019. http://dx.doi.org/10.24963/ijcai.2019/152.
Повний текст джерелаOllivier, Mathilde, Sébastien Bardin, Richard Bonichon, and Jean-Yves Marion. "Obfuscation." In the 9th Workshop. New York, New York, USA: ACM Press, 2019. http://dx.doi.org/10.1145/3371307.3371309.
Повний текст джерелаWang, Pei, Shuai Wang, Jiang Ming, Yufei Jiang, and Dinghao Wu. "Translingual Obfuscation." In 2016 IEEE European Symposium on Security and Privacy (EuroS&P). IEEE, 2016. http://dx.doi.org/10.1109/eurosp.2016.21.
Повний текст джерелаЗвіти організацій з теми "Obfuscations"
Campbell, Philip LaRoche. An introduction to software obfuscation. Office of Scientific and Technical Information (OSTI), June 2004. http://dx.doi.org/10.2172/919159.
Повний текст джерелаEllison, Glenn, and Alexander Wolitzky. A Search Cost Model of Obfuscation. Cambridge, MA: National Bureau of Economic Research, August 2009. http://dx.doi.org/10.3386/w15237.
Повний текст джерелаEllison, Glenn, and Sara Fisher Ellison. Search, Obfuscation, and Price Elasticities on the Internet. Cambridge, MA: National Bureau of Economic Research, June 2004. http://dx.doi.org/10.3386/w10570.
Повний текст джерелаAnderson, William Erik. On the secure obfuscation of deterministic finite automata. Office of Scientific and Technical Information (OSTI), June 2008. http://dx.doi.org/10.2172/974399.
Повний текст джерелаKoushanfar, F., and J. Kong. IC Piracy Protection by APUF and Logic Obfuscation. Fort Belvoir, VA: Defense Technical Information Center, January 2014. http://dx.doi.org/10.21236/ada597856.
Повний текст джерелаCarlin, Bruce Ian, and Gustavo Manso. Obfuscation, Learning, and the Evolution of Investor Sophistication. Cambridge, MA: National Bureau of Economic Research, May 2009. http://dx.doi.org/10.3386/w14954.
Повний текст джерелаSolis, John. A flexible framework for secure and efficient program obfuscation. Office of Scientific and Technical Information (OSTI), March 2013. http://dx.doi.org/10.2172/1096167.
Повний текст джерелаLakhotia, Arun, and Vir V. Phoha. (DEPSCOR FY 09) Obfuscation and Deobfuscation of Intent of Computer Programs. Fort Belvoir, VA: Defense Technical Information Center, December 2012. http://dx.doi.org/10.21236/ada583338.
Повний текст джерелаCrispin, Darla. Artistic Research as a Process of Unfolding. Norges Musikkhøgskole, August 2018. http://dx.doi.org/10.22501/nmh-ar.503395.
Повний текст джерелаZarate, Carolina, Simson L. Garfinkel, Aubin Heffernan, Kyle Gorak, and Scott Horras. A Survey of XOR as a Digital Obfuscation Technique in a Corpus of Real Data. Fort Belvoir, VA: Defense Technical Information Center, January 2014. http://dx.doi.org/10.21236/ada592678.
Повний текст джерела