Taint-assisted IAT Reconstruction against Position Obfuscation

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Obfuscation for and against device fingerprinting Position Paper for Symposium on Obfuscation New York University, February 15, 2014

Web-based device fingerprinting is the process of collecting information through the browser that is sufficient to perform device identification. Fonts, screen dimensions, language, timezone, plugins and user agent string are examples of properties that, if combined, may serve as globally unique identifier. Indeed, a 2010 study by Peter Eckersley (EFF) based on data collected from about half a ...

متن کامل

Protecting Obfuscation against Algebraic Attacks

The goal of general-purpose program obfuscation is to make an arbitrary computer program “unintelligible” while preserving its functionality. At least as far back as the work of Diffie and Hellman in 1976, researchers have contemplated applications of general-purpose obfuscation. However, until 2013, even heuristic constructions for general-purpose obfuscation were not known. This changed with ...

متن کامل

Protecting obfuscation against arithmetic attacks

Recently, the work of Garg et al. (FOCS 2013) gave the first candidate general-purpose obfuscator. This construction is built upon multilinear maps, also called a graded encoding scheme. Several subsequent works have shown that variants of this obfuscator achieves the highest notion of security (VBB security) against “purely algebraic” attacks, namely attacks that respect the restrictions of th...

متن کامل

Detecting IAT Faking 1 RUNNING HEAD: DETECTING IAT FAKING

120 words) Instructed male and female participants to produce an altered response pattern on an Implicit Association Test (IAT) measure of gender identity by slowing performance in trials requiring the same response to stimuli designating own gender and self. Participants’ faking success was found to be predictable by a measure of slowing relative to unfaked performances. This “combined task sl...

متن کامل

TAO: Protecting Against Hitlist Worms Using Transparent Address Obfuscation

Sophisticated worms that use precomputed hitlists of vulnerable targets are especially hard to contain, since they are harder to detect, and spread at rates where even automated defenses may not be able to react in a timely fashion. Recent work has examined a proactive defense mechanism called Network Address Space Randomization (NASR) whose objective is to harden networks specifically against ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Journal of Information Processing

سال: 2018

ISSN: 1882-6652

DOI: 10.2197/ipsjjip.26.813