منابع مشابه
An Obfuscating Compiler
Privacy for arbitrary encrypted remote computation in the cloud depends on the running code on the server being obfuscated from the standpoint of the operator in the computer room. This paper shows that that may be arranged on a platform with the appropriate machine code architecture, given the obfuscating compiler described.
متن کاملA Taxonomy of Obfuscating Transformations
It has become more and more common to distribute software in forms that retain most or all of the information present in the original source code. An important example is Java bytecode. Since such codes are easy to decompile, they increase the risk of malicious reverse engineering attacks. In this paper we review several techniques for technical protection of software secrets. We will argue tha...
متن کاملAssociational Resistance and Associational Susceptibility: Having Right or Wrong Neighbors
Specific plant associations may decrease (associational resistance, AR) or increase (associational susceptibility, AS) the likelihood of detection by, and/or vulnerability to, herbivores. We discuss presumed mechanisms leading to AR and AS, suggest others, and conduct meta-analyses on plant and herbivore traits affecting AR and AS, and the effects of habitat. Specific plant associations determi...
متن کاملPhyCloak: Obfuscating Sensing from Communication Signals
Recognition of human activities and gestures using preexisting WiFi signals has been shown to be feasible in recent studies. Given the pervasiveness of WiFi signals, this emerging sort of sensing poses a serious privacy threat. This paper is the first to counter the threat of unwanted or even malicious communication based sensing: it proposes a blackbox sensor obfuscation technique PhyCloak whi...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Kidney International
سال: 2004
ISSN: 0085-2538
DOI: 10.1111/j.1523-1755.2004.669_7.x