Taint-assisted IAT Reconstruction against Position Obfuscation
نویسندگان
چکیده
منابع مشابه
Obfuscation for and against device fingerprinting Position Paper for Symposium on Obfuscation New York University, February 15, 2014
Web-based device fingerprinting is the process of collecting information through the browser that is sufficient to perform device identification. Fonts, screen dimensions, language, timezone, plugins and user agent string are examples of properties that, if combined, may serve as globally unique identifier. Indeed, a 2010 study by Peter Eckersley (EFF) based on data collected from about half a ...
متن کاملProtecting Obfuscation against Algebraic Attacks
The goal of general-purpose program obfuscation is to make an arbitrary computer program “unintelligible” while preserving its functionality. At least as far back as the work of Diffie and Hellman in 1976, researchers have contemplated applications of general-purpose obfuscation. However, until 2013, even heuristic constructions for general-purpose obfuscation were not known. This changed with ...
متن کاملProtecting obfuscation against arithmetic attacks
Recently, the work of Garg et al. (FOCS 2013) gave the first candidate general-purpose obfuscator. This construction is built upon multilinear maps, also called a graded encoding scheme. Several subsequent works have shown that variants of this obfuscator achieves the highest notion of security (VBB security) against “purely algebraic” attacks, namely attacks that respect the restrictions of th...
متن کاملDetecting IAT Faking 1 RUNNING HEAD: DETECTING IAT FAKING
120 words) Instructed male and female participants to produce an altered response pattern on an Implicit Association Test (IAT) measure of gender identity by slowing performance in trials requiring the same response to stimuli designating own gender and self. Participants’ faking success was found to be predictable by a measure of slowing relative to unfaked performances. This “combined task sl...
متن کاملTAO: Protecting Against Hitlist Worms Using Transparent Address Obfuscation
Sophisticated worms that use precomputed hitlists of vulnerable targets are especially hard to contain, since they are harder to detect, and spread at rates where even automated defenses may not be able to react in a timely fashion. Recent work has examined a proactive defense mechanism called Network Address Space Randomization (NASR) whose objective is to harden networks specifically against ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of Information Processing
سال: 2018
ISSN: 1882-6652
DOI: 10.2197/ipsjjip.26.813