|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 385 occurrences of 212 keywords
|
|
|
Results
Found 1965 publication records. Showing 1965 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
185 | Nikolay Kuzurin, Alexander V. Shokurov, Nikolay P. Varnovsky, Vladimir A. Zakharov |
On the Concept of Software Obfuscation in Computer Security.  |
ISC  |
2007 |
DBLP DOI BibTeX RDF |
Program obfuscation, security, encryption, Turing machine |
102 | Ran Canetti, Ronny Ramzi Dakdouk |
Obfuscating Point Functions with Multibit Output.  |
EUROCRYPT  |
2008 |
DBLP DOI BibTeX RDF |
composable obfuscation, multibit point function obfuscation, digital locker, point function obfuscation, obfuscation |
101 | Mila Dalla Preda, Roberto Giacobazzi |
Semantic-Based Code Obfuscation by Abstract Interpretation.  |
ICALP  |
2005 |
DBLP DOI BibTeX RDF |
Semantics, Program Transformation, Abstract Interpretation, Code Obfuscation |
101 | Xiaotong Zhuang, Tao Zhang 0037, Hsien-Hsin S. Lee, Santosh Pande |
Hardware assisted control flow obfuscation for embedded processors.  |
CASES  |
2004 |
DBLP DOI BibTeX RDF |
obfuscation, control flow graph |
101 | Mikhail Sosonkin, Gleb Naumovich, Nasir D. Memon |
Obfuscation of design intent in object-oriented applications.  |
Digital Rights Management Workshop  |
2003 |
DBLP DOI BibTeX RDF |
code generation, refactoring, software obfuscation |
89 | Mila Dalla Preda, Roberto Giacobazzi |
Control Code Obfuscation by Abstract Interpretation.  |
SEFM  |
2005 |
DBLP DOI BibTeX RDF |
Semantics, Program Transformation, Program analysis, Abstract Interpretation, Code Obfuscation |
82 | Yu-Lun Huang, F. S. Ho, Hsin-Yi Tsai, H. M. Kao |
A control flow obfuscation method to discourage malicious tampering of software codes.  |
AsiaCCS  |
2006 |
DBLP DOI BibTeX RDF |
control flow obfuscation, reverse engineering, tamper-resistance, intellectual property protection, software obfuscation |
77 | Stephen Drape, Irina Voiculescu |
Creating Transformations for Matrix Obfuscation.  |
SAS  |
2009 |
DBLP DOI BibTeX RDF |
Program Transformations, Information Hiding, Obfuscation, Matrix Operations |
77 | Praveen Sivadasan, P. Sojan Lal, Naveen Sivadasan |
JDATATRANS for array obfuscation in Java source codes to defeat reverse engineering from decompiled codes.  |
Bangalore Compute Conf.  |
2009 |
DBLP DOI BibTeX RDF |
restructured arrays, source code obfuscation, reverse engineering |
77 | Mariano Ceccato, Massimiliano Di Penta, Jasvir Nagra, Paolo Falcarin, Filippo Ricca, Marco Torchiano, Paolo Tonella |
Towards experimental evaluation of code obfuscation techniques.  |
QoP  |
2008 |
DBLP DOI BibTeX RDF |
empirical studies, software obfuscation |
77 | Matias Madou, Ludo Van Put, Koen De Bosschere |
LOCO: an interactive code (De)obfuscation tool.  |
PEPM  |
2006 |
DBLP DOI BibTeX RDF |
security, binary rewriting, code obfuscation |
76 | Nikolay P. Varnovsky, Vladimir A. Zakharov |
On the Possibility of Provably Secure Obfuscating Programs.  |
Ershov Memorial Conference  |
2003 |
DBLP DOI BibTeX RDF |
hard-core predicate, security, program transformation, mutual information, obfuscation, one-way function |
73 | Mariano Ceccato, Massimiliano Di Penta, Jasvir Nagra, Paolo Falcarin, Filippo Ricca, Marco Torchiano, Paolo Tonella |
The effectiveness of source code obfuscation: An experimental assessment.  |
ICPC  |
2009 |
DBLP DOI BibTeX RDF |
|
73 | Matt Duckham, Lars Kulik |
Simulation of Obfuscation and Negotiation for Location Privacy.  |
COSIT  |
2005 |
DBLP DOI BibTeX RDF |
|
65 | Byoungyoung Lee, Yuna Kim, Jong Kim 0001 |
binOb+: a framework for potent and stealthy binary obfuscation.  |
AsiaCCS  |
2010 |
DBLP DOI BibTeX RDF |
binary obfuscation, stealth, windows SEH, reverse engineering, exception handling |
65 | Seongje Cho, Hyeyoung Chang, Yookun Cho |
Implementation of an Obfuscation Tool for C/C++ Source Code Protection on the XScale Architecture.  |
SEUS  |
2008 |
DBLP DOI BibTeX RDF |
Source Code Protection, Reverse Engineering, Obfuscation |
65 | Jafar Haadi Jafarian, Ali Noorollahi Ravari, Morteza Amini, Rasool Jalili |
Protecting Location Privacy through a Graph-Based Location Representation and a Robust Obfuscation Technique.  |
ICISC  |
2008 |
DBLP DOI BibTeX RDF |
Obfuscation Techniques, Reliability, Distributed Architecture, Location Privacy, Middleware Architecture |
65 | Dennis Hofheinz, John Malone-Lee, Martijn Stam |
Obfuscation for Cryptographic Purposes.  |
TCC  |
2007 |
DBLP DOI BibTeX RDF |
point functions, obfuscation |
65 | Mahadevan Gomathisankaran, Akhilesh Tyagi |
Architecture Support for 3D Obfuscation.  |
IEEE Trans. Computers  |
2006 |
DBLP DOI BibTeX RDF |
secure systems architecture, digital rights management, Obfuscation |
65 | Anirban Majumdar 0001, Clark D. Thomborson |
Manufacturing opaque predicates in distributed systems for code obfuscation.  |
ACSC  |
2006 |
DBLP BibTeX RDF |
distributed predicate detection, mobile code protection, opaque predicates, software protection, distributed systems security, code obfuscation |
65 | Yusuke Sakabe, Masakazu Soshi, Atsuko Miyaji |
Java Obfuscation with a Theoretical Basis for Building Secure Mobile Agents.  |
Communications and Multimedia Security  |
2003 |
DBLP DOI BibTeX RDF |
security, computational complexity, mobile agents, static analysis, obfuscation |
65 | Chao Dai, Jianmin Pang, Rongcai Zhao, Xiaojun Ma |
Static Analysis of the Disassembly against Malicious Code Obfuscated with Conditional Jumps.  |
ACIS-ICIS  |
2008 |
DBLP DOI BibTeX RDF |
conditional jump, obfuscation, malicious codes, disassembly |
65 | Louis Goubin, Jean-Michel Masereel, Michaël Quisquater |
Cryptanalysis of White Box DES Implementations.  |
Selected Areas in Cryptography  |
2007 |
DBLP DOI BibTeX RDF |
cryptanalysis, block cipher, DES, Obfuscation, symmetric cryptography |
61 | Kazuhide Fukushima, Shinsaku Kiyomoto, Toshiaki Tanaka |
Obfuscation Mechanism in Conjunction with Tamper-Proof Module.  |
CSE (2)  |
2009 |
DBLP DOI BibTeX RDF |
|
61 | Shafi Goldwasser |
Program Obfuscation and One-Time Programs.  |
CT-RSA  |
2008 |
DBLP DOI BibTeX RDF |
|
61 | Shafi Goldwasser, Guy N. Rothblum |
On Best-Possible Obfuscation.  |
TCC  |
2007 |
DBLP DOI BibTeX RDF |
|
61 | Ben Lynn, Manoj Prabhakaran 0001, Amit Sahai |
Positive Results and Techniques for Obfuscation.  |
EUROCRYPT  |
2004 |
DBLP DOI BibTeX RDF |
|
60 | Philippe Beaucamps, Eric Filiol |
On the possibility of practically obfuscating programs towards a unified perspective of code protection.  |
J. Comput. Virol.  |
2007 |
DBLP DOI BibTeX RDF |
|
60 | Susan Hohenberger, Guy N. Rothblum, Abhi Shelat, Vinod Vaikuntanathan |
Securely Obfuscating Re-encryption.  |
TCC  |
2007 |
DBLP DOI BibTeX RDF |
|
53 | Shenoda Guirguis, Alok Pareek |
BronzeGate: real-time transactional data obfuscation for GoldenGate.  |
EDBT  |
2010 |
DBLP DOI BibTeX RDF |
data obfuscation, real-time transactional data management, security, privacy, usability, masking |
53 | Bertrand Anckaert, Matias Madou, Bjorn De Sutter, Bruno De Bus, Koen De Bosschere, Bart Preneel |
Program obfuscation: a quantitative approach.  |
QoP  |
2007 |
DBLP DOI BibTeX RDF |
program obfuscation, metrics, quantification |
53 | Valery Pryamikov |
Call Tree Transformation for Program Obfuscation and Copy Protection.  |
DRMTICS  |
2005 |
DBLP DOI BibTeX RDF |
Software Copy Protection, Software Watermarking, Software Obfuscation |
53 | David E. Bakken, Rupa Parameswaran, Douglas M. Blough, Andy A. Franz, Ty J. Palmer |
Data Obfuscation: Anonymity and Desensitization of Usable Data Sets.  |
IEEE Secur. Priv.  |
2004 |
DBLP DOI BibTeX RDF |
data obfuscation, data sharing, data privacy |
53 | Srivatsan Narayanan, Ananth Raghunathan, Ramarathnam Venkatesan |
Obfuscating straight line arithmetic programs.  |
Digital Rights Management Workshop  |
2009 |
DBLP DOI BibTeX RDF |
hard-to-factor polynomials, straight line arithmetic programs, drm, obfuscation, software protection, secure hardware |
53 | Xiangdong An 0001, Dawn N. Jutla, Nick Cercone |
Temporal Context Lie Detection and Generation.  |
Secure Data Management  |
2006 |
DBLP DOI BibTeX RDF |
pervasive computing, obfuscation, dynamic Bayesian networks, inference control, uncertain reasoning, Privacy management, context inference |
53 | Mihai Christodorescu, Somesh Jha |
Testing malware detectors.  |
ISSTA  |
2004 |
DBLP DOI BibTeX RDF |
malware, obfuscation, adaptive testing, anti-virus |
49 | Ran Canetti, Mayank Varia |
Non-malleable Obfuscation.  |
TCC  |
2009 |
DBLP DOI BibTeX RDF |
|
49 | Shafi Goldwasser, Yael Tauman Kalai |
On the Impossibility of Obfuscation with Auxiliary Input.  |
FOCS  |
2005 |
DBLP DOI BibTeX RDF |
|
49 | Mahadevan Gomathisankaran, Akhilesh Tyagi |
Arc3D: A 3D Obfuscation Architecture.  |
HiPEAC  |
2005 |
DBLP DOI BibTeX RDF |
|
49 | Kelly Heffner, Christian S. Collberg |
The Obfuscation Executive.  |
ISC  |
2004 |
DBLP DOI BibTeX RDF |
|
49 | Kazuhide Fukushima, Kouichi Sakurai |
A Software Fingerprinting Scheme for Java Using Classfiles Obfuscation.  |
WISA  |
2003 |
DBLP DOI BibTeX RDF |
|
48 | Sharath K. Udupa, Saumya K. Debray, Matias Madou |
Deobfuscation: Reverse Engineering Obfuscated Code.  |
WCRE  |
2005 |
DBLP DOI BibTeX RDF |
|
48 | Ralph Gross, Edoardo M. Airoldi, Bradley A. Malin, Latanya Sweeney |
Integrating Utility into Face De-identification.  |
Privacy Enhancing Technologies  |
2005 |
DBLP DOI BibTeX RDF |
|
48 | Matthias Jacob, Dan Boneh, Edward W. Felten |
Attacking an Obfuscated Cipher by Injecting Faults.  |
Digital Rights Management Workshop  |
2002 |
DBLP DOI BibTeX RDF |
|
41 | Rajat Subhra Chakraborty, Swarup Bhunia |
Hardware protection and authentication through netlist level obfuscation.  |
ICCAD  |
2008 |
DBLP DOI BibTeX RDF |
IP piracy, design for security, hardware authentication, hardware obfuscation, hardware protection |
41 | Jun Ge, Soma Chaudhuri, Akhilesh Tyagi |
Control flow based obfuscation.  |
Digital Rights Management Workshop  |
2005 |
DBLP DOI BibTeX RDF |
control flow, software obfuscation |
41 | Cullen Linn, Saumya K. Debray |
Obfuscation of executable code to improve resistance to static disassembly.  |
CCS  |
2003 |
DBLP DOI BibTeX RDF |
disassembly, code obfuscation |
41 | Christian S. Collberg, Clark D. Thomborson |
Watermarking, Tamper-Proofing, and Obfuscation-Tools for Software Protection.  |
IEEE Trans. Software Eng.  |
2002 |
DBLP DOI BibTeX RDF |
watermarking, Obfuscation, intellectual property protection, tamper-proofing |
41 | Fahim K. Sufi, Ibrahim Khalil |
A New Feature Detection Mechanism and Its Application in Secured ECG Transmission with Noise Masking.  |
J. Medical Syst.  |
2009 |
DBLP DOI BibTeX RDF |
ECG obfuscation, ECG feature detection, Securing ECG data, ECG encryption, HIPAA |
41 | Stephen Drape, Anirban Majumdar 0001, Clark D. Thomborson |
Slicing Aided Design of Obfuscating Transforms.  |
ACIS-ICIS  |
2007 |
DBLP DOI BibTeX RDF |
Program Transformation, Slicing, Obfuscation |
41 | Stephen Drape, Clark D. Thomborson, Anirban Majumdar 0001 |
Specifying Imperative Data Obfuscations.  |
ISC  |
2007 |
DBLP DOI BibTeX RDF |
Data Obfuscation, Specification, Refinement, Correctness |
41 | Rafail Ostrovsky, William E. Skeith III |
Private Searching on Streaming Data.  |
CRYPTO  |
2005 |
DBLP DOI BibTeX RDF |
Crypto-computing, Public-key Encryption with special properties, Privacy-Preserving Keyword Search, Secure Algorithms for Streaming Data, Privacy-Preserving Datamining, Secure Delegation of Computation, Searching with Privacy, Software security, Mobile code, Database security, Private Information Retrieval, Code Obfuscation |
41 | Sandra Ring, Eric Cole |
Taking a Lesson from Stealthy Rootkits.  |
IEEE Secur. Priv.  |
2004 |
DBLP DOI BibTeX RDF |
reverse engineering, rootkits, malicious code, software obfuscation |
38 | Dongxue Pan, Hongda Li 0001, Peifang Ni |
Candidate Differing-Inputs Obfuscation from Indistinguishability Obfuscation and Auxiliary-Input Point Obfuscation.  |
IACR Cryptol. ePrint Arch.  |
2018 |
DBLP BibTeX RDF |
|
37 | John Aycock, Juan M. Gutiérrez Cárdenas, Daniel Medeiros Nunes de Castro |
Code Obfuscation Using Pseudo-random Number Generators.  |
CSE (3)  |
2009 |
DBLP DOI BibTeX RDF |
|
37 | Jean-Marie Borello, Ludovic Mé |
Code obfuscation techniques for metamorphic viruses.  |
J. Comput. Virol.  |
2008 |
DBLP DOI BibTeX RDF |
|
37 | Maciej Brzozowski, Vyacheslav N. Yarmolik |
Obfuscation as Intellectual Rights Protection in VHDL Language.  |
CISIM  |
2007 |
DBLP DOI BibTeX RDF |
|
37 | William Zhu 0001, Clark D. Thomborson, Fei-Yue Wang 0001 |
Applications of Homomorphic Functions to Software Obfuscation.  |
WISI  |
2006 |
DBLP DOI BibTeX RDF |
|
37 | Matt Duckham, Lars Kulik |
A Formal Model of Obfuscation and Negotiation for Location Privacy.  |
Pervasive  |
2005 |
DBLP DOI BibTeX RDF |
|
37 | Tatsuya Toyofuku, Toshihiro Tabata, Kouichi Sakurai |
Program Obfuscation Scheme Using Random Numbers to Complicate Control Flow.  |
EUC Workshops  |
2005 |
DBLP DOI BibTeX RDF |
|
37 | Ryan Wishart, Karen Henricksen, Jadwiga Indulska |
Context Obfuscation for Privacy via Ontological Descriptions.  |
LoCA  |
2005 |
DBLP DOI BibTeX RDF |
|
36 | Amitabh Saxena, Brecht Wyseur, Bart Preneel |
Towards Security Notions for White-Box Cryptography.  |
ISC  |
2009 |
DBLP DOI BibTeX RDF |
|
36 | Xinran Wang, Yoon-chan Jhi, Sencun Zhu, Peng Liu 0005 |
STILL: Exploit Code Detection via Static Taint and Initialization Analyses.  |
ACSAC  |
2008 |
DBLP DOI BibTeX RDF |
|
36 | Abhishek RayChaudhuri, Ujwal K. Chinthala, Amiya Bhattacharya |
Obfuscating temporal context of sensor data by coalescing at source.  |
ACM SIGMOBILE Mob. Comput. Commun. Rev.  |
2007 |
DBLP DOI BibTeX RDF |
|
36 | Satoshi Hada, Kouichi Sakurai |
A Note on the (Im)possibility of Using Obfuscators to Transform Private-Key Encryption into Public-Key Encryption.  |
IWSEC  |
2007 |
DBLP DOI BibTeX RDF |
|
36 | Claudio Agostino Ardagna, Marco Cremonini, Ernesto Damiani, Sabrina De Capitani di Vimercati, Pierangela Samarati |
Managing Privacy in LBAC Systems.  |
AINA Workshops (2)  |
2007 |
DBLP DOI BibTeX RDF |
|
36 | Andreas Moser, Christopher Kruegel, Engin Kirda |
Limits of Static Analysis for Malware Detection.  |
ACSAC  |
2007 |
DBLP DOI BibTeX RDF |
|
36 | Mila Dalla Preda, Matias Madou, Koen De Bosschere, Roberto Giacobazzi |
Opaque Predicates Detection by Abstract Interpretation.  |
AMAST  |
2006 |
DBLP DOI BibTeX RDF |
|
36 | Xiangdong An 0001, Dawn N. Jutla, Nick Cercone |
Reasoning about obfuscated private information: who have lied and how to lie.  |
WPES  |
2006 |
DBLP DOI BibTeX RDF |
Bayesian networks, privacy protection, inference control, ubiquitous environments |
36 | Yu Yu, Jussipekka Leiwo, A. Benjamin Premkumar |
Hiding Circuit Topology from Unbounded Reverse Engineers.  |
ACISP  |
2006 |
DBLP DOI BibTeX RDF |
|
36 | Boaz Barak, Oded Goldreich 0001, Russell Impagliazzo, Steven Rudich, Amit Sahai, Salil P. Vadhan, Ke Yang 0005 |
On the (Im)possibility of Obfuscating Programs.  |
CRYPTO  |
2001 |
DBLP DOI BibTeX RDF |
|
29 | Philip O'Kane, Sakir Sezer, Kieran McLaughlin |
Obfuscation: The Hidden Malware.  |
IEEE Secur. Priv.  |
2011 |
DBLP DOI BibTeX RDF |
packer, metamorphism, computer security, polymorphism, malware, obfuscation |
29 | Teng Long, Lin Liu 0001, Yijun Yu, Zhiguo Wan |
Assure High Quality Code Using Refactoring and Obfuscation Techniques.  |
FCST  |
2010 |
DBLP DOI BibTeX RDF |
Software Quality, Refactoring, Obfuscation, i* |
29 | Haibo Chen 0001, Liwei Yuan, Xi Wu 0001, Binyu Zang, Bo Huang 0002, Pen-Chung Yew |
Control flow obfuscation with information flow tracking.  |
MICRO  |
2009 |
DBLP DOI BibTeX RDF |
control flow obfuscation, opaque predicate, information flow tracking, control speculation |
29 | Jusuk Lee, Kyoochang Jeong, Heejo Lee |
Detecting metamorphic malwares using code graphs.  |
SAC  |
2010 |
DBLP DOI BibTeX RDF |
code graph, metamorphic malware, static analysis, code obfuscation |
29 | Mariano Ceccato, Paolo Tonella, Mila Dalla Preda, Anirban Majumdar 0004 |
Remote software protection by orthogonal client replacement.  |
SAC  |
2009 |
DBLP DOI BibTeX RDF |
remote trusting, program transformation, software security, obfuscation, clone detection |
29 | Hoeteck Wee |
Zero Knowledge in the Random Oracle Model, Revisited.  |
ASIACRYPT  |
2009 |
DBLP DOI BibTeX RDF |
sequential composition, zero-knowledge, obfuscation, random oracle model |
29 | Yameng Bai, Xingming Sun, Guang Sun, Xiaohong Deng, Xiaoming Zhou |
Dynamic K-Gram Based Software Birthmark.  |
Australian Software Engineering Conference  |
2008 |
DBLP DOI BibTeX RDF |
Software Theft, k-gram, Obfuscation, Dynamic Program Slicing, Software Birthmark |
29 | Daniel Slamanig, Christian Stingl |
Privacy Aspects of eHealth.  |
ARES  |
2008 |
DBLP DOI BibTeX RDF |
Identity Management, Obfuscation, Pseudonymization, Anonymous Authentication |
29 | Karen Heyman |
New Attack Tricks Antivirus Software.  |
Computer  |
2007 |
DBLP DOI BibTeX RDF |
antivirus software, dynamic code obfuscation, DCO attacks |
29 | Anirban Majumdar 0001, Stephen Drape, Clark D. Thomborson |
Metrics-based Evaluation of Slicing Obfuscations.  |
IAS  |
2007 |
DBLP DOI BibTeX RDF |
Evaluation, Metrics, Slicing, Obfuscation |
29 | Matthias Jacob, Mariusz H. Jakubowski, Ramarathnam Venkatesan |
Towards integral binary execution: implementing oblivious hashing using overlapped instruction encodings.  |
MM&Sec  |
2007 |
DBLP DOI BibTeX RDF |
anti-disassembly, oblivious hashing, overlapped code, obfuscation, tamper-resistance, integrity checking |
29 | Anirban Majumdar 0001, Stephen Drape, Clark D. Thomborson |
Slicing obfuscations: design, correctness, and evaluation.  |
Digital Rights Management Workshop  |
2007 |
DBLP DOI BibTeX RDF |
program transformation, digital rights management, software security, obfuscation, static slicing |
29 | Ariel Futoransky, Emiliano Kargieman, Carlos Sarraute, Ariel Waissbein |
Foundations and applications for secure triggers.  |
ACM Trans. Inf. Syst. Secur.  |
2006 |
DBLP DOI BibTeX RDF |
Malicious host problem, secure triggers, obfuscation, universally composable security, mobile code security |
29 | Abdulrahman Alarifi, Wenliang Du |
Diversify sensor nodes to improve resilience against node compromise.  |
SASN  |
2006 |
DBLP DOI BibTeX RDF |
wireless sensor networks, reverse engineering, diversity, obfuscation |
29 | Arvind Narayanan, Vitaly Shmatikov |
Obfuscated databases and group privacy.  |
CCS  |
2005 |
DBLP DOI BibTeX RDF |
obfuscation, database privacy |
29 | Wenliang Du, Michael T. Goodrich |
Searching for High-Value Rare Events with Uncheatable Grid Computing.  |
ACNS  |
2005 |
DBLP DOI BibTeX RDF |
security, Grid computing, obfuscation, cheating, cryptographic hash functions |
29 | Hoeteck Wee |
On obfuscating point functions.  |
STOC  |
2005 |
DBLP DOI BibTeX RDF |
obfuscation |
29 | Yevgeniy Dodis, Adam D. Smith |
Correcting errors without leaking partial information.  |
STOC  |
2005 |
DBLP DOI BibTeX RDF |
entropic security, cryptography, error-correcting codes, randomness extractors, code obfuscation, bounded storage model, information reconciliation |
29 | Lori Vinciguerra, Linda M. Wills, Nidhi Kejriwal, Paul Martino, Ralph L. Vinciguerra |
An Experimentation Framework for Evaluating Disassembly and Decompilation Tools for C++ and Java.  |
WCRE  |
2003 |
DBLP DOI BibTeX RDF |
binary reverse engineering, obfuscation, binary translation, decompilation, disassembly |
29 | Gaël Hachez, Laurent Den Hollander, Mehrdad Jalali, Jean-Jacques Quisquater, Christophe Vasserot |
Towards a Practical Secure Framework for Mobile Code Commerce.  |
ISW  |
2000 |
DBLP DOI BibTeX RDF |
electronic right management, electronic commerce, watermarking, copyright protection, obfuscation, software piracy |
29 | Jens Palsberg, S. Krishnaswamy, Minseok Kwon, Di Ma, Qiuyun Shao, Y. Zhang |
Experience with Software Watermarking.  |
ACSAC  |
2000 |
DBLP DOI BibTeX RDF |
program-transformation attacks, heap-space usage, watermark retrieval time, protection technique, tamperproofing, Java, Java, data structures, security of data, execution times, obfuscation, dynamic data structures, code size, software watermarking, copy protection |
29 | Christian S. Collberg, Clark D. Thomborson, Douglas Low |
Breaking Abstractions and Unstructuring Data Structures.  |
ICCL  |
1998 |
DBLP DOI BibTeX RDF |
obfuscation, intellectual property protection, code transformations |
25 | Patrick Kochberger, Maximilian Gramberger, Sebastian Schrittwieser, Caroline Lawitschka, Edgar R. Weippl |
Large Language Models for Code Obfuscation Evaluation of the Obfuscation Capabilities of OpenAI's GPT-3.5 on C Source Code.  |
SECRYPT  |
2023 |
DBLP DOI BibTeX RDF |
|
25 | Julien Cassagne, Ettore Merlo, Guy-Vincent Jourdan, Iosif-Viorel Onut |
Following the Obfuscation Trail: Identifying and Exploiting Obfuscation Signatures in Malicious Code.  |
FPS (1)  |
2023 |
DBLP DOI BibTeX RDF |
|
25 | Andrew Wintenberg, Stéphane Lafortune, Necmiye Ozay |
Communication Obfuscation for Privacy and Utility against Obfuscation-Aware Eavesdroppers.  |
ACC  |
2022 |
DBLP DOI BibTeX RDF |
|
25 | Xiaolu Zhang, Frank Breitinger, Engelbert Luechinger, Stephen O'Shaughnessy |
Android application forensics: A survey of obfuscation, obfuscation detection and deobfuscation techniques and their impact on investigations.  |
Digit. Investig.  |
2021 |
DBLP DOI BibTeX RDF |
|
25 | Qipeng Liu 0001, Mark Zhandry |
Decomposable Obfuscation: A Framework for Building Applications of Obfuscation from Polynomial Hardness.  |
J. Cryptol.  |
2021 |
DBLP DOI BibTeX RDF |
|
25 | Hui Xu 0009, Yangfan Zhou, Jiang Ming 0002, Michael R. Lyu |
Layered obfuscation: a taxonomy of software obfuscation techniques for layered security.  |
Cybersecur.  |
2020 |
DBLP DOI BibTeX RDF |
|
25 | Zhichao Wang, Yiwei Shan, Zhi Yang, Ruoyi Wang, Shuang Song |
Semantic redirection obfuscation: A control flow obfuscation based on Android Runtime.  |
TrustCom  |
2020 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #100 of 1965 (100 per page; Change: ) Pages: [ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ >>] |
|