نتایج جستجو برای: obfuscation and vagueness

تعداد نتایج: 16827488  

Journal: :Philosophy Compass 2013

Journal: :BioScience 2012

Journal: :Semantics and Pragmatics 2019

2015
Salar Mohtaj Habibollah Asghari Vahid Zarrabi

In this paper, we describe an approach to create monolingual English plagiarism detection corpus for the task of text alignment corpus construction in PAN 2015 competition. We propose two different obfuscation methods to fragment obfuscation for creating the cases of plagiarism. The first method is an artificial obfuscation which consists of variety of obfuscation strategies such as synonym sub...

2014
Pille Pullonen Dominique Unruh

The intuitive meaning of obfuscation is taking a program and turning it into a program with the same functionality but somehow unintelligible structure. There have been practical approaches at obfuscating computer programs, but until 2001 [BGI01] there was not much theory in this field. Especially, it was not well defined what is meant by obfuscation. The main step of specifying the meaning of ...

2003
Lars Kulik

This paper presents a geometric characterization of geographic objects with vague boundaries. Since the framework is based on ordering geometry and does not rely on numerical concepts, it can be applied to qualitative spatial reasoning. The characterization describes vague regions and gradual transitions between two vague regions. This approach takes into account that the region of all points t...

2003
Larry D'Anna Brian Matt Andrew Reisse Tom Van Vleck Steve Schwab Patrick LeBlanc

This document describes our investigation into software obfuscation for building SelfProtecting Mobile Agents (SPMA). The original goal of the SPMA project was to develop automated tools to protect mobile agents from attacks by malicious hosts. In development of those tools, we realized obfuscation could not be relied upon to give a reasonable amount of security. Because of this, we redirected ...

2013
VIR V PHOHA

This research aimed at developing a theoretical framework to predict the next obfuscation (or deobfuscation) move of the adversary, with the intent of making cyber defense proactive. More specifically, the goal was to understand the relationship between obfuscation and deobfuscation techniques employed in malware offense and defense. The strategy was to build upon previous work of Giacobazzi an...

Journal: :CoRR 2017
Hui Xu Yangfan Zhou Yu Kang Michael R. Lyu

Program obfuscation is a widely employed approach for software intellectual property protection. However, general obfuscation methods (e.g., lexical obfuscation, control obfuscation) implemented in mainstream obfuscation tools are heuristic and have little security guarantee. Recently in 2013, Garg et al. have achieved a breakthrough in secure program obfuscation with a graded encoding mechanis...

2005
Mila Dalla Preda Roberto Giacobazzi

Interpretation Mila Dalla Preda and Roberto Giacobazzi Dipartimento di Informatica, Università di Verona Strada Le Grazie 15, 37134 Verona (Italy) [email protected] | [email protected] Abstract. In this paper we introduce a semantic-based approach for code obfuscation. The aim of code obfuscation is to prevent malicious users to disclose properties of the original source program. ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید