نتایج جستجو برای: obfuscation and vagueness

تعداد نتایج: 16827488  

2004
Stephen Drape

An obfuscation is a behaviour-preserving program transformation whose aim is to make a program “harder to understand”. Obfuscations are applied to make reverse engineering of a program more difficult. Two concerns about an obfuscation are whether it preserves behaviour (i.e. it is correct) and the degree to which it maintains efficiency. Obfuscations are applied mainly to objectoriented program...

Journal: :PoPETs 2015
Reza Shokri

Consider users who share their data (e.g., location) with an untrusted service provider to obtain a personalized (e.g., location-based) service. Data obfuscation is a prevalent user-centric approach to protecting users’ privacy in such systems: the untrusted entity only receives a noisy version of user’s data. Perturbing data before sharing it, however, comes at the price of the users’ utility ...

Journal: :IACR Cryptology ePrint Archive 2013
Omkant Pandey Manoj Prabhakaran Amit Sahai

We show the following result: Assuming the existence of public-coin differing-input obfuscation (pc-diO) for the class of all polynomial time Turing machines, then there exists a four message, fully concurrent zero-knowledge proof system for all languages in NP with negligible soundness error. This result is constructive: given pc-diO, our reduction yields an explicit protocol along with an exp...

2008
Ran Canetti Ronny Ramzi Dakdouk

We study obfuscation of point functions with multibit output and other related functions. A point function with multibit output returns a string on a single input point and zero everywhere else. We provide a construction that obfuscates these functions. The construction is generic in the sense that it can use any perfectly one-way (POW) function or obfuscator for point functions. Analyzing this...

2013
Heqing Huang Sencun Zhu Peng Liu Dinghao Wu

Because it is not hard to reverse engineer the Dalvik bytecode used in the Dalvik virtual machine, Android application repackaging has become a serious problem. With repackaging, a plagiarist can simply steal others’ code violating the intellectual property of the developers. More seriously, after repackaging, popular apps can become the carriers of malware, adware or spy-ware for wide spreadin...

Journal: :Forensic Science International: Digital Investigation 2021

Android obfuscation techniques include not only classic code that were adapted to Android, but also methods target the platform specifically. This work examines status-quo of obfuscation, detection and deobfuscation. Specifically, it first summarizes approaches are commonly used by app developers for optimization, protect their software against theft tampering frequently misused malware circumv...

2007
William Feng Zhu Clark Thomborson

With the rapid development of the internet, copying a digital document is so easy and economically affordable that digital piracy is rampant. As a result, software protection has become a vital issue in current computer industry and a hot research topic. Software watermarking and obfuscation are techniques to protect software from unauthorized access, modification, and tampering. While software...

Journal: : 2023

Purpose of the paper: a search for rather abstract representation PowerShell script functionality using syntax trees such that an invisible obfuscated can be detected provided associated is already known malware. Research method: obfuscation analysis performed on three types obfuscation: token, string, and tree. The obtained result: 1) we have found simple AST-based features, as number AST func...

2014
Elette Boyle Kai-Min Chung Rafael Pass

We initiate the study of extractability obfuscation (a.k.a. differing-inputs obfuscation), a notion first suggested by Barak et al. (JACM 2012): An extractability obfuscator eO for a class of algorithmsM guarantees that if an efficient attacker A can distinguish between obfuscations eO(M1), eO(M2) of two algorithms M1,M2 ∈M, then A can efficiently recover (given M1 and M2) an input on which M1 ...

2014
Terence Chen Roksana Boreli Mohamed Ali Kâafar Arik Friedman

Data obfuscation is a well-known technique for protecting user privacy against inference attacks, and it was studied in diverse settings, including search queries, recommender systems, location-based services and Online Social Networks (OSNs). However, these studies typically take the point of view of a single user who applies obfuscation, and focus on protection of a single target attribute. U...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید