منابع مشابه
An Obfuscating Compiler
Privacy for arbitrary encrypted remote computation in the cloud depends on the running code on the server being obfuscated from the standpoint of the operator in the computer room. This paper shows that that may be arranged on a platform with the appropriate machine code architecture, given the obfuscating compiler described.
متن کاملA Taxonomy of Obfuscating Transformations
It has become more and more common to distribute software in forms that retain most or all of the information present in the original source code. An important example is Java bytecode. Since such codes are easy to decompile, they increase the risk of malicious reverse engineering attacks. In this paper we review several techniques for technical protection of software secrets. We will argue tha...
متن کاملBelieving Conjunctions
I shall argue in this paper that it should.1 To begin with, I shall defend (CP) against several criticisms that have been launched against it. These criticisms are of two kinds, which I shall call internal and external respectively. Internal objections are that a theory that includes (CP) fails to give an account of what it is rational to believe that is satisfactory by its own standards. In pa...
متن کاملPhyCloak: Obfuscating Sensing from Communication Signals
Recognition of human activities and gestures using preexisting WiFi signals has been shown to be feasible in recent studies. Given the pervasiveness of WiFi signals, this emerging sort of sensing poses a serious privacy threat. This paper is the first to counter the threat of unwanted or even malicious communication based sensing: it proposes a blackbox sensor obfuscation technique PhyCloak whi...
متن کاملObfuscating Gender in Social Media Writing
The vast availability of textual data on social media has led to an interest in algorithms to automatically predict user attributes such as gender based on the user’s writing. These methods are valuable for social science research as well as targeted advertising and profiling, but also compromise the privacy of users who may not realize that their personal idiolects can give away their demograp...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of Cryptology
سال: 2015
ISSN: 0933-2790,1432-1378
DOI: 10.1007/s00145-015-9221-5