The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for obfuscation with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1998-2003 (31) 2004 (18) 2005 (37) 2006 (40) 2007 (50) 2008 (50) 2009 (43) 2010 (39) 2011 (37) 2012 (48) 2013 (56) 2014 (133) 2015 (115) 2016 (153) 2017 (148) 2018 (159) 2019 (139) 2020 (157) 2021 (168) 2022 (152) 2023 (148) 2024 (44)
Publication types (Num. hits)
article(830) book(2) incollection(9) inproceedings(1091) phdthesis(33)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 385 occurrences of 212 keywords

Results
Found 1965 publication records. Showing 1965 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
185Nikolay Kuzurin, Alexander V. Shokurov, Nikolay P. Varnovsky, Vladimir A. Zakharov On the Concept of Software Obfuscation in Computer Security. Search on Bibsonomy ISC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Program obfuscation, security, encryption, Turing machine
102Ran Canetti, Ronny Ramzi Dakdouk Obfuscating Point Functions with Multibit Output. Search on Bibsonomy EUROCRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF composable obfuscation, multibit point function obfuscation, digital locker, point function obfuscation, obfuscation
101Mila Dalla Preda, Roberto Giacobazzi Semantic-Based Code Obfuscation by Abstract Interpretation. Search on Bibsonomy ICALP The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Semantics, Program Transformation, Abstract Interpretation, Code Obfuscation
101Xiaotong Zhuang, Tao Zhang 0037, Hsien-Hsin S. Lee, Santosh Pande Hardware assisted control flow obfuscation for embedded processors. Search on Bibsonomy CASES The full citation details ... 2004 DBLP  DOI  BibTeX  RDF obfuscation, control flow graph
101Mikhail Sosonkin, Gleb Naumovich, Nasir D. Memon Obfuscation of design intent in object-oriented applications. Search on Bibsonomy Digital Rights Management Workshop The full citation details ... 2003 DBLP  DOI  BibTeX  RDF code generation, refactoring, software obfuscation
89Mila Dalla Preda, Roberto Giacobazzi Control Code Obfuscation by Abstract Interpretation. Search on Bibsonomy SEFM The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Semantics, Program Transformation, Program analysis, Abstract Interpretation, Code Obfuscation
82Yu-Lun Huang, F. S. Ho, Hsin-Yi Tsai, H. M. Kao A control flow obfuscation method to discourage malicious tampering of software codes. Search on Bibsonomy AsiaCCS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF control flow obfuscation, reverse engineering, tamper-resistance, intellectual property protection, software obfuscation
77Stephen Drape, Irina Voiculescu Creating Transformations for Matrix Obfuscation. Search on Bibsonomy SAS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Program Transformations, Information Hiding, Obfuscation, Matrix Operations
77Praveen Sivadasan, P. Sojan Lal, Naveen Sivadasan JDATATRANS for array obfuscation in Java source codes to defeat reverse engineering from decompiled codes. Search on Bibsonomy Bangalore Compute Conf. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF restructured arrays, source code obfuscation, reverse engineering
77Mariano Ceccato, Massimiliano Di Penta, Jasvir Nagra, Paolo Falcarin, Filippo Ricca, Marco Torchiano, Paolo Tonella Towards experimental evaluation of code obfuscation techniques. Search on Bibsonomy QoP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF empirical studies, software obfuscation
77Matias Madou, Ludo Van Put, Koen De Bosschere LOCO: an interactive code (De)obfuscation tool. Search on Bibsonomy PEPM The full citation details ... 2006 DBLP  DOI  BibTeX  RDF security, binary rewriting, code obfuscation
76Nikolay P. Varnovsky, Vladimir A. Zakharov On the Possibility of Provably Secure Obfuscating Programs. Search on Bibsonomy Ershov Memorial Conference The full citation details ... 2003 DBLP  DOI  BibTeX  RDF hard-core predicate, security, program transformation, mutual information, obfuscation, one-way function
73Mariano Ceccato, Massimiliano Di Penta, Jasvir Nagra, Paolo Falcarin, Filippo Ricca, Marco Torchiano, Paolo Tonella The effectiveness of source code obfuscation: An experimental assessment. Search on Bibsonomy ICPC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
73Matt Duckham, Lars Kulik Simulation of Obfuscation and Negotiation for Location Privacy. Search on Bibsonomy COSIT The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
65Byoungyoung Lee, Yuna Kim, Jong Kim 0001 binOb+: a framework for potent and stealthy binary obfuscation. Search on Bibsonomy AsiaCCS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF binary obfuscation, stealth, windows SEH, reverse engineering, exception handling
65Seongje Cho, Hyeyoung Chang, Yookun Cho Implementation of an Obfuscation Tool for C/C++ Source Code Protection on the XScale Architecture. Search on Bibsonomy SEUS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Source Code Protection, Reverse Engineering, Obfuscation
65Jafar Haadi Jafarian, Ali Noorollahi Ravari, Morteza Amini, Rasool Jalili Protecting Location Privacy through a Graph-Based Location Representation and a Robust Obfuscation Technique. Search on Bibsonomy ICISC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Obfuscation Techniques, Reliability, Distributed Architecture, Location Privacy, Middleware Architecture
65Dennis Hofheinz, John Malone-Lee, Martijn Stam Obfuscation for Cryptographic Purposes. Search on Bibsonomy TCC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF point functions, obfuscation
65Mahadevan Gomathisankaran, Akhilesh Tyagi Architecture Support for 3D Obfuscation. Search on Bibsonomy IEEE Trans. Computers The full citation details ... 2006 DBLP  DOI  BibTeX  RDF secure systems architecture, digital rights management, Obfuscation
65Anirban Majumdar 0001, Clark D. Thomborson Manufacturing opaque predicates in distributed systems for code obfuscation. Search on Bibsonomy ACSC The full citation details ... 2006 DBLP  BibTeX  RDF distributed predicate detection, mobile code protection, opaque predicates, software protection, distributed systems security, code obfuscation
65Yusuke Sakabe, Masakazu Soshi, Atsuko Miyaji Java Obfuscation with a Theoretical Basis for Building Secure Mobile Agents. Search on Bibsonomy Communications and Multimedia Security The full citation details ... 2003 DBLP  DOI  BibTeX  RDF security, computational complexity, mobile agents, static analysis, obfuscation
65Chao Dai, Jianmin Pang, Rongcai Zhao, Xiaojun Ma Static Analysis of the Disassembly against Malicious Code Obfuscated with Conditional Jumps. Search on Bibsonomy ACIS-ICIS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF conditional jump, obfuscation, malicious codes, disassembly
65Louis Goubin, Jean-Michel Masereel, Michaël Quisquater Cryptanalysis of White Box DES Implementations. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2007 DBLP  DOI  BibTeX  RDF cryptanalysis, block cipher, DES, Obfuscation, symmetric cryptography
61Kazuhide Fukushima, Shinsaku Kiyomoto, Toshiaki Tanaka Obfuscation Mechanism in Conjunction with Tamper-Proof Module. Search on Bibsonomy CSE (2) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
61Shafi Goldwasser Program Obfuscation and One-Time Programs. Search on Bibsonomy CT-RSA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
61Shafi Goldwasser, Guy N. Rothblum On Best-Possible Obfuscation. Search on Bibsonomy TCC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
61Ben Lynn, Manoj Prabhakaran 0001, Amit Sahai Positive Results and Techniques for Obfuscation. Search on Bibsonomy EUROCRYPT The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
60Philippe Beaucamps, Eric Filiol On the possibility of practically obfuscating programs towards a unified perspective of code protection. Search on Bibsonomy J. Comput. Virol. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
60Susan Hohenberger, Guy N. Rothblum, Abhi Shelat, Vinod Vaikuntanathan Securely Obfuscating Re-encryption. Search on Bibsonomy TCC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
53Shenoda Guirguis, Alok Pareek BronzeGate: real-time transactional data obfuscation for GoldenGate. Search on Bibsonomy EDBT The full citation details ... 2010 DBLP  DOI  BibTeX  RDF data obfuscation, real-time transactional data management, security, privacy, usability, masking
53Bertrand Anckaert, Matias Madou, Bjorn De Sutter, Bruno De Bus, Koen De Bosschere, Bart Preneel Program obfuscation: a quantitative approach. Search on Bibsonomy QoP The full citation details ... 2007 DBLP  DOI  BibTeX  RDF program obfuscation, metrics, quantification
53Valery Pryamikov Call Tree Transformation for Program Obfuscation and Copy Protection. Search on Bibsonomy DRMTICS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Software Copy Protection, Software Watermarking, Software Obfuscation
53David E. Bakken, Rupa Parameswaran, Douglas M. Blough, Andy A. Franz, Ty J. Palmer Data Obfuscation: Anonymity and Desensitization of Usable Data Sets. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF data obfuscation, data sharing, data privacy
53Srivatsan Narayanan, Ananth Raghunathan, Ramarathnam Venkatesan Obfuscating straight line arithmetic programs. Search on Bibsonomy Digital Rights Management Workshop The full citation details ... 2009 DBLP  DOI  BibTeX  RDF hard-to-factor polynomials, straight line arithmetic programs, drm, obfuscation, software protection, secure hardware
53Xiangdong An 0001, Dawn N. Jutla, Nick Cercone Temporal Context Lie Detection and Generation. Search on Bibsonomy Secure Data Management The full citation details ... 2006 DBLP  DOI  BibTeX  RDF pervasive computing, obfuscation, dynamic Bayesian networks, inference control, uncertain reasoning, Privacy management, context inference
53Mihai Christodorescu, Somesh Jha Testing malware detectors. Search on Bibsonomy ISSTA The full citation details ... 2004 DBLP  DOI  BibTeX  RDF malware, obfuscation, adaptive testing, anti-virus
49Ran Canetti, Mayank Varia Non-malleable Obfuscation. Search on Bibsonomy TCC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
49Shafi Goldwasser, Yael Tauman Kalai On the Impossibility of Obfuscation with Auxiliary Input. Search on Bibsonomy FOCS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
49Mahadevan Gomathisankaran, Akhilesh Tyagi Arc3D: A 3D Obfuscation Architecture. Search on Bibsonomy HiPEAC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
49Kelly Heffner, Christian S. Collberg The Obfuscation Executive. Search on Bibsonomy ISC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
49Kazuhide Fukushima, Kouichi Sakurai A Software Fingerprinting Scheme for Java Using Classfiles Obfuscation. Search on Bibsonomy WISA The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
48Sharath K. Udupa, Saumya K. Debray, Matias Madou Deobfuscation: Reverse Engineering Obfuscated Code. Search on Bibsonomy WCRE The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
48Ralph Gross, Edoardo M. Airoldi, Bradley A. Malin, Latanya Sweeney Integrating Utility into Face De-identification. Search on Bibsonomy Privacy Enhancing Technologies The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
48Matthias Jacob, Dan Boneh, Edward W. Felten Attacking an Obfuscated Cipher by Injecting Faults. Search on Bibsonomy Digital Rights Management Workshop The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
41Rajat Subhra Chakraborty, Swarup Bhunia Hardware protection and authentication through netlist level obfuscation. Search on Bibsonomy ICCAD The full citation details ... 2008 DBLP  DOI  BibTeX  RDF IP piracy, design for security, hardware authentication, hardware obfuscation, hardware protection
41Jun Ge, Soma Chaudhuri, Akhilesh Tyagi Control flow based obfuscation. Search on Bibsonomy Digital Rights Management Workshop The full citation details ... 2005 DBLP  DOI  BibTeX  RDF control flow, software obfuscation
41Cullen Linn, Saumya K. Debray Obfuscation of executable code to improve resistance to static disassembly. Search on Bibsonomy CCS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF disassembly, code obfuscation
41Christian S. Collberg, Clark D. Thomborson Watermarking, Tamper-Proofing, and Obfuscation-Tools for Software Protection. Search on Bibsonomy IEEE Trans. Software Eng. The full citation details ... 2002 DBLP  DOI  BibTeX  RDF watermarking, Obfuscation, intellectual property protection, tamper-proofing
41Fahim K. Sufi, Ibrahim Khalil A New Feature Detection Mechanism and Its Application in Secured ECG Transmission with Noise Masking. Search on Bibsonomy J. Medical Syst. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF ECG obfuscation, ECG feature detection, Securing ECG data, ECG encryption, HIPAA
41Stephen Drape, Anirban Majumdar 0001, Clark D. Thomborson Slicing Aided Design of Obfuscating Transforms. Search on Bibsonomy ACIS-ICIS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Program Transformation, Slicing, Obfuscation
41Stephen Drape, Clark D. Thomborson, Anirban Majumdar 0001 Specifying Imperative Data Obfuscations. Search on Bibsonomy ISC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Data Obfuscation, Specification, Refinement, Correctness
41Rafail Ostrovsky, William E. Skeith III Private Searching on Streaming Data. Search on Bibsonomy CRYPTO The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Crypto-computing, Public-key Encryption with special properties, Privacy-Preserving Keyword Search, Secure Algorithms for Streaming Data, Privacy-Preserving Datamining, Secure Delegation of Computation, Searching with Privacy, Software security, Mobile code, Database security, Private Information Retrieval, Code Obfuscation
41Sandra Ring, Eric Cole Taking a Lesson from Stealthy Rootkits. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF reverse engineering, rootkits, malicious code, software obfuscation
38Dongxue Pan, Hongda Li 0001, Peifang Ni Candidate Differing-Inputs Obfuscation from Indistinguishability Obfuscation and Auxiliary-Input Point Obfuscation. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2018 DBLP  BibTeX  RDF
37John Aycock, Juan M. Gutiérrez Cárdenas, Daniel Medeiros Nunes de Castro Code Obfuscation Using Pseudo-random Number Generators. Search on Bibsonomy CSE (3) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
37Jean-Marie Borello, Ludovic Mé Code obfuscation techniques for metamorphic viruses. Search on Bibsonomy J. Comput. Virol. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
37Maciej Brzozowski, Vyacheslav N. Yarmolik Obfuscation as Intellectual Rights Protection in VHDL Language. Search on Bibsonomy CISIM The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
37William Zhu 0001, Clark D. Thomborson, Fei-Yue Wang 0001 Applications of Homomorphic Functions to Software Obfuscation. Search on Bibsonomy WISI The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
37Matt Duckham, Lars Kulik A Formal Model of Obfuscation and Negotiation for Location Privacy. Search on Bibsonomy Pervasive The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
37Tatsuya Toyofuku, Toshihiro Tabata, Kouichi Sakurai Program Obfuscation Scheme Using Random Numbers to Complicate Control Flow. Search on Bibsonomy EUC Workshops The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
37Ryan Wishart, Karen Henricksen, Jadwiga Indulska Context Obfuscation for Privacy via Ontological Descriptions. Search on Bibsonomy LoCA The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
36Amitabh Saxena, Brecht Wyseur, Bart Preneel Towards Security Notions for White-Box Cryptography. Search on Bibsonomy ISC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
36Xinran Wang, Yoon-chan Jhi, Sencun Zhu, Peng Liu 0005 STILL: Exploit Code Detection via Static Taint and Initialization Analyses. Search on Bibsonomy ACSAC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
36Abhishek RayChaudhuri, Ujwal K. Chinthala, Amiya Bhattacharya Obfuscating temporal context of sensor data by coalescing at source. Search on Bibsonomy ACM SIGMOBILE Mob. Comput. Commun. Rev. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
36Satoshi Hada, Kouichi Sakurai A Note on the (Im)possibility of Using Obfuscators to Transform Private-Key Encryption into Public-Key Encryption. Search on Bibsonomy IWSEC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
36Claudio Agostino Ardagna, Marco Cremonini, Ernesto Damiani, Sabrina De Capitani di Vimercati, Pierangela Samarati Managing Privacy in LBAC Systems. Search on Bibsonomy AINA Workshops (2) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
36Andreas Moser, Christopher Kruegel, Engin Kirda Limits of Static Analysis for Malware Detection. Search on Bibsonomy ACSAC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
36Mila Dalla Preda, Matias Madou, Koen De Bosschere, Roberto Giacobazzi Opaque Predicates Detection by Abstract Interpretation. Search on Bibsonomy AMAST The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
36Xiangdong An 0001, Dawn N. Jutla, Nick Cercone Reasoning about obfuscated private information: who have lied and how to lie. Search on Bibsonomy WPES The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Bayesian networks, privacy protection, inference control, ubiquitous environments
36Yu Yu, Jussipekka Leiwo, A. Benjamin Premkumar Hiding Circuit Topology from Unbounded Reverse Engineers. Search on Bibsonomy ACISP The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
36Boaz Barak, Oded Goldreich 0001, Russell Impagliazzo, Steven Rudich, Amit Sahai, Salil P. Vadhan, Ke Yang 0005 On the (Im)possibility of Obfuscating Programs. Search on Bibsonomy CRYPTO The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
29Philip O'Kane, Sakir Sezer, Kieran McLaughlin Obfuscation: The Hidden Malware. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2011 DBLP  DOI  BibTeX  RDF packer, metamorphism, computer security, polymorphism, malware, obfuscation
29Teng Long, Lin Liu 0001, Yijun Yu, Zhiguo Wan Assure High Quality Code Using Refactoring and Obfuscation Techniques. Search on Bibsonomy FCST The full citation details ... 2010 DBLP  DOI  BibTeX  RDF Software Quality, Refactoring, Obfuscation, i*
29Haibo Chen 0001, Liwei Yuan, Xi Wu 0001, Binyu Zang, Bo Huang 0002, Pen-Chung Yew Control flow obfuscation with information flow tracking. Search on Bibsonomy MICRO The full citation details ... 2009 DBLP  DOI  BibTeX  RDF control flow obfuscation, opaque predicate, information flow tracking, control speculation
29Jusuk Lee, Kyoochang Jeong, Heejo Lee Detecting metamorphic malwares using code graphs. Search on Bibsonomy SAC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF code graph, metamorphic malware, static analysis, code obfuscation
29Mariano Ceccato, Paolo Tonella, Mila Dalla Preda, Anirban Majumdar 0004 Remote software protection by orthogonal client replacement. Search on Bibsonomy SAC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF remote trusting, program transformation, software security, obfuscation, clone detection
29Hoeteck Wee Zero Knowledge in the Random Oracle Model, Revisited. Search on Bibsonomy ASIACRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF sequential composition, zero-knowledge, obfuscation, random oracle model
29Yameng Bai, Xingming Sun, Guang Sun, Xiaohong Deng, Xiaoming Zhou Dynamic K-Gram Based Software Birthmark. Search on Bibsonomy Australian Software Engineering Conference The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Software Theft, k-gram, Obfuscation, Dynamic Program Slicing, Software Birthmark
29Daniel Slamanig, Christian Stingl Privacy Aspects of eHealth. Search on Bibsonomy ARES The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Identity Management, Obfuscation, Pseudonymization, Anonymous Authentication
29Karen Heyman New Attack Tricks Antivirus Software. Search on Bibsonomy Computer The full citation details ... 2007 DBLP  DOI  BibTeX  RDF antivirus software, dynamic code obfuscation, DCO attacks
29Anirban Majumdar 0001, Stephen Drape, Clark D. Thomborson Metrics-based Evaluation of Slicing Obfuscations. Search on Bibsonomy IAS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Evaluation, Metrics, Slicing, Obfuscation
29Matthias Jacob, Mariusz H. Jakubowski, Ramarathnam Venkatesan Towards integral binary execution: implementing oblivious hashing using overlapped instruction encodings. Search on Bibsonomy MM&Sec The full citation details ... 2007 DBLP  DOI  BibTeX  RDF anti-disassembly, oblivious hashing, overlapped code, obfuscation, tamper-resistance, integrity checking
29Anirban Majumdar 0001, Stephen Drape, Clark D. Thomborson Slicing obfuscations: design, correctness, and evaluation. Search on Bibsonomy Digital Rights Management Workshop The full citation details ... 2007 DBLP  DOI  BibTeX  RDF program transformation, digital rights management, software security, obfuscation, static slicing
29Ariel Futoransky, Emiliano Kargieman, Carlos Sarraute, Ariel Waissbein Foundations and applications for secure triggers. Search on Bibsonomy ACM Trans. Inf. Syst. Secur. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Malicious host problem, secure triggers, obfuscation, universally composable security, mobile code security
29Abdulrahman Alarifi, Wenliang Du Diversify sensor nodes to improve resilience against node compromise. Search on Bibsonomy SASN The full citation details ... 2006 DBLP  DOI  BibTeX  RDF wireless sensor networks, reverse engineering, diversity, obfuscation
29Arvind Narayanan, Vitaly Shmatikov Obfuscated databases and group privacy. Search on Bibsonomy CCS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF obfuscation, database privacy
29Wenliang Du, Michael T. Goodrich Searching for High-Value Rare Events with Uncheatable Grid Computing. Search on Bibsonomy ACNS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF security, Grid computing, obfuscation, cheating, cryptographic hash functions
29Hoeteck Wee On obfuscating point functions. Search on Bibsonomy STOC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF obfuscation
29Yevgeniy Dodis, Adam D. Smith Correcting errors without leaking partial information. Search on Bibsonomy STOC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF entropic security, cryptography, error-correcting codes, randomness extractors, code obfuscation, bounded storage model, information reconciliation
29Lori Vinciguerra, Linda M. Wills, Nidhi Kejriwal, Paul Martino, Ralph L. Vinciguerra An Experimentation Framework for Evaluating Disassembly and Decompilation Tools for C++ and Java. Search on Bibsonomy WCRE The full citation details ... 2003 DBLP  DOI  BibTeX  RDF binary reverse engineering, obfuscation, binary translation, decompilation, disassembly
29Gaël Hachez, Laurent Den Hollander, Mehrdad Jalali, Jean-Jacques Quisquater, Christophe Vasserot Towards a Practical Secure Framework for Mobile Code Commerce. Search on Bibsonomy ISW The full citation details ... 2000 DBLP  DOI  BibTeX  RDF electronic right management, electronic commerce, watermarking, copyright protection, obfuscation, software piracy
29Jens Palsberg, S. Krishnaswamy, Minseok Kwon, Di Ma, Qiuyun Shao, Y. Zhang Experience with Software Watermarking. Search on Bibsonomy ACSAC The full citation details ... 2000 DBLP  DOI  BibTeX  RDF program-transformation attacks, heap-space usage, watermark retrieval time, protection technique, tamperproofing, Java, Java, data structures, security of data, execution times, obfuscation, dynamic data structures, code size, software watermarking, copy protection
29Christian S. Collberg, Clark D. Thomborson, Douglas Low Breaking Abstractions and Unstructuring Data Structures. Search on Bibsonomy ICCL The full citation details ... 1998 DBLP  DOI  BibTeX  RDF obfuscation, intellectual property protection, code transformations
25Patrick Kochberger, Maximilian Gramberger, Sebastian Schrittwieser, Caroline Lawitschka, Edgar R. Weippl Large Language Models for Code Obfuscation Evaluation of the Obfuscation Capabilities of OpenAI's GPT-3.5 on C Source Code. Search on Bibsonomy SECRYPT The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
25Julien Cassagne, Ettore Merlo, Guy-Vincent Jourdan, Iosif-Viorel Onut Following the Obfuscation Trail: Identifying and Exploiting Obfuscation Signatures in Malicious Code. Search on Bibsonomy FPS (1) The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
25Andrew Wintenberg, Stéphane Lafortune, Necmiye Ozay Communication Obfuscation for Privacy and Utility against Obfuscation-Aware Eavesdroppers. Search on Bibsonomy ACC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
25Xiaolu Zhang, Frank Breitinger, Engelbert Luechinger, Stephen O'Shaughnessy Android application forensics: A survey of obfuscation, obfuscation detection and deobfuscation techniques and their impact on investigations. Search on Bibsonomy Digit. Investig. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
25Qipeng Liu 0001, Mark Zhandry Decomposable Obfuscation: A Framework for Building Applications of Obfuscation from Polynomial Hardness. Search on Bibsonomy J. Cryptol. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
25Hui Xu 0009, Yangfan Zhou, Jiang Ming 0002, Michael R. Lyu Layered obfuscation: a taxonomy of software obfuscation techniques for layered security. Search on Bibsonomy Cybersecur. The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
25Zhichao Wang, Yiwei Shan, Zhi Yang, Ruoyi Wang, Shuang Song Semantic redirection obfuscation: A control flow obfuscation based on Android Runtime. Search on Bibsonomy TrustCom The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #100 of 1965 (100 per page; Change: )
Pages: [1][2][3][4][5][6][7][8][9][10][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license