نتایج جستجو برای: obfuscation and vagueness

تعداد نتایج: 16827488  

Journal: :IACR Cryptology ePrint Archive 2015
Christina Brzuska Arno Mittelbach

Universal Computational Extractors (UCEs), introduced by Bellare, Hoang and Keelveedhi (CRYPTO 2013), are a framework of assumptions on hash functions that allow to instantiate random oracles in a large variety of settings. Brzuska, Farshim and Mittelbach (CRYPTO 2014) showed that a large class of UCE assumptions with computationally unpredictable sources cannot be achieved, if indistinguishabi...

2009
Ying Zeng Fenlin Liu Xiangyang Luo Chunfang Yang

Code obfuscation can alter the syntactic properties of malware byte sequences without significantly affecting their execution behaviors. Thus it can easily foil signature-based detection. In this paper, the ability of handling obfuscation transformations of the semanticsbased malware detection algorithm MOM A proposed by Gao et al. is discussed using abstract interpretation theory from a semant...

2003
Michael J. Raven

Abstract. Vagueness is blamed for the Sorites Paradox. But the nature of vagueness is not well understood. Initially characterizing vagueness in terms of Sainsbury’s boundary metaphor, I argue that all semantic theories failing to do justice to this boundary metaphor are false. However, it is unclear what kind of semantic theory of vagueness is immune to this charge. I explore the boundary meta...

Journal: :IACR Cryptology ePrint Archive 2015
Nir Bitansky Vinod Vaikuntanathan

We show general transformations from subexponentially-secure approximate indistinguishability obfuscation (IO) where the obfuscated circuit agrees with the original circuit on a 1/2 + fraction of inputs on a certain samplable distribution, into exact indistinguishability obfuscation where the obfuscated circuit and the original circuit agree on all inputs. As a step towards our results, which i...

2013
Boaz Barak Sanjam Garg Yael Tauman Kalai Omer Paneth Amit Sahai

The goal of general-purpose program obfuscation is to make an arbitrary computer program “unintelligible” while preserving its functionality. At least as far back as the work of Diffie and Hellman in 1976, researchers have contemplated applications of general-purpose obfuscation. However, until 2013, even heuristic constructions for general-purpose obfuscation were not known. This changed with ...

2016
Fatemeh Mashhadirajab Mehrnoush Shamsfard

In this paper, we describe our text alignment algorithm that achieved the first rank in Persian Plagdet 2016 competition. The Persian Plagdet corpus includes several obfuscation strategies. Information about the type of obfuscation helps plagiarism detection systems to use their most suitable algorithm for each type. For this purpose, we use SVM neural network for classification of documents ac...

2012
DIDIER DUBOIS Didier Dubois

From their inception, fuzzy sets were introduced by Zadeh [55] with a view to formalize human knowledge in engineering problems. This implies fuzzy sets had somehow to come to grip with some aspects of natural language modeling, and in particular, with the concept of vagueness, i.e., the idea that the extension of some natural language predicates lacks clear truth conditions. The claim that fuz...

2014
Leilei Kong Zhimao Lu Haoliang Qi Zhongyuan Han

Providing effective methods of identification of high-obfuscation plagiarism seeds presents a significant research problem in the field of plagiarism detection. The conventional methods of plagiarism detection are based on single type of features to capture plagiarism seeds. But for high-obfuscation plagiarism detection, these single type features are not sufficient for identifying the plagiari...

2003
Mihai Christodorescu Somesh Jha

Malicious code detection is a crucial component of any defense mechanism. In this paper, we present a unique viewpoint on malicious code detection. We regard malicious code detection as an obfuscation-deobfuscation game between malicious code writers and researchers working on malicious code detection. Malicious code writers attempt to obfuscate the malicious code to subvert the malicious code ...

Journal: :Thought: A Journal of Philosophy 2018

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید