Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
25 | Nicolas Szlifierski |
Contrôle sûr de chaînes d'obfuscation logicielle. (Safe control of obfuscation toolchains). ![Search on Bibsonomy](Pics/bibsonomy.png) |
|
2020 |
RDF |
|
25 | Pierre Graux |
Challenges of native android applications: obfuscation and vulnerabilities. (Défis pour les applications Android Natives: obfuscation et vulnérabilités). ![Search on Bibsonomy](Pics/bibsonomy.png) |
|
2020 |
RDF |
|
25 | Yuan Kang, Chengyu Lin 0001, Tal Malkin, Mariana Raykova 0001 |
Obfuscation from Polynomial Hardness: Beyond Decomposable Obfuscation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2019, pp. 308, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP BibTeX RDF |
|
25 | Yuan Kang, Chengyu Lin 0001, Tal Malkin, Mariana Raykova 0001 |
Obfuscation from Polynomial Hardness: Beyond Decomposable Obfuscation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCN ![In: Security and Cryptography for Networks - 11th International Conference, SCN 2018, Amalfi, Italy, September 5-7, 2018, Proceedings, pp. 407-424, 2018, Springer, 978-3-319-98112-3. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
25 | Qipeng Liu 0001, Mark Zhandry |
Exploding Obfuscation: A Framework for Building Applications of Obfuscation From Polynomial Hardness. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2017, pp. 209, 2017. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP BibTeX RDF |
|
25 | Qipeng Liu 0001, Mark Zhandry |
Decomposable Obfuscation: A Framework for Building Applications of Obfuscation from Polynomial Hardness. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TCC (1) ![In: Theory of Cryptography - 15th International Conference, TCC 2017, Baltimore, MD, USA, November 12-15, 2017, Proceedings, Part I, pp. 138-169, 2017, Springer, 978-3-319-70499-9. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
25 | G. Sumathi, L. Srivani, D. Thirugnana Murthy, Anish Kumar, K. Madhusoodanan |
Hardware Obfuscation Using Different Obfuscation Cell Structures for PLDs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SG-CRC ![In: A Systems Approach to Cyber Security - Proceedings of the 2nd Singapore Cyber-Security R&D Conference (SG-CRC 2017), Singapore, February 21-22, 2017, pp. 143-157, 2017, IOS Press, 978-1-61499-743-6. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
25 | Ninon Eyrolles |
Obfuscation with Mixed Boolean-Arithmetic Expressions : reconstruction, analysis and simplification tools. (Obfuscation par expressions mixtes arithmético-booléennes : reconstruction, analyse et outils de simplification). ![Search on Bibsonomy](Pics/bibsonomy.png) |
|
2017 |
RDF |
|
25 | Hayato Sagisaka, Haruaki Tamada |
Identifying the applied obfuscation method towards de-obfuscation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICIS ![In: 15th IEEE/ACIS International Conference on Computer and Information Science, ICIS 2016, Okayama, Japan, June 26-29, 2016, pp. 1-6, 2016, IEEE Computer Society, 978-1-5090-0806-3. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
25 | Christina Brzuska, Arno Mittelbach |
Indistinguishability Obfuscation versus Point Obfuscation with Auxiliary Input. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2014, pp. 405, 2014. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP BibTeX RDF |
|
25 | Sandrine Blazy, Stéphanie Riaud |
Measuring the robustness of source program obfuscation: studying the impact of compiler optimizations on the obfuscation of C programs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CODASPY ![In: Fourth ACM Conference on Data and Application Security and Privacy, CODASPY'14, San Antonio, TX, USA - March 03 - 05, 2014, pp. 123-126, 2014, ACM, 978-1-4503-2278-2. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
25 | Christina Brzuska, Arno Mittelbach |
Indistinguishability Obfuscation versus Multi-bit Point Obfuscation with Auxiliary Input. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIACRYPT (2) ![In: Advances in Cryptology - ASIACRYPT 2014 - 20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, Taiwan, R.O.C., December 7-11, 2014, Proceedings, Part II, pp. 142-161, 2014, Springer, 978-3-662-45607-1. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
25 | Jan Cappaert |
Code Obfuscation Techniques for Software Protection (Code obfuscatietechnieken voor softwarebeveiliging) ; Code Obfuscation Techniques for Software Protection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
|
2012 |
RDF |
|
25 | Joanna Witkowska |
The Quality of Obfuscation and Obfuscation Techniques. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Biometrics, Computer Security Systems and Artificial Intelligence Applications ![In: Biometrics, Computer Security Systems and Artificial Intelligence Applications., pp. 175-182, 2006, Springer, 978-0-387-36232-8. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
25 | Liu Wenyin, Anthony Y. Fu, Xiaotie Deng |
Exposing Homograph Obfuscation Intentions by Coloring Unicode Strings. ![Search on Bibsonomy](Pics/bibsonomy.png) |
APWeb ![In: Progress in WWW Research and Development, 10th Asia-Pacific Web Conference, APWeb 2008, Shenyang, China, April 26-28, 2008. Proceedings, pp. 275-286, 2008, Springer, 978-3-540-78848-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
25 | Claudio A. Ardagna, Marco Cremonini, Ernesto Damiani, Sabrina De Capitani di Vimercati, Pierangela Samarati |
Location Privacy Protection Through Obfuscation-Based Techniques. (PDF / PS) ![Search on Bibsonomy](Pics/bibsonomy.png) |
DBSec ![In: Data and Applications Security XXI, 21st Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Redondo Beach, CA, USA, July 8-11, 2007, Proceedings, pp. 47-60, 2007, Springer, 978-3-540-73533-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
25 | Ryan Wishart, Karen Henricksen, Jadwiga Indulska |
Context Privacy and Obfuscation Supported by Dynamic Context Source Discovery and Processing in a Context Management System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
UIC ![In: Ubiquitous Intelligence and Computing, 4th International Conference, UIC 2007, Hong Kong, China, July 11-13, 2007, Proceedings, pp. 929-940, 2007, Springer, 978-3-540-73548-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
25 | Spyros Antonatos, Kostas G. Anagnostakis |
TAO: Protecting Against Hitlist Worms Using Transparent Address Obfuscation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Communications and Multimedia Security ![In: Communications and Multimedia Security, 10th IFIP TC-6 TC-11 International Conference, CMS 2006, Heraklion, Crete, Greece, October 19-21, 2006, Proceedings, pp. 12-21, 2006, Springer, 3-540-47820-5. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
25 | Peter Kawalek, David Graham Wastell, Michael Newman |
Problematisation and Obfuscation in e-Government. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EGOV ![In: Electronic Government, Second International Conference, EGOV 2003, Prague, Czech Republic, September 1-5, 2003, Proceedings, pp. 228-233, 2003, Springer, 3-540-40845-2. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
25 | Stanley Chow, Yuan Xiang Gu, Harold Johnson, Vladimir A. Zakharov |
An Approach to the Obfuscation of Control-Flow of Sequential Computer Programs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 4th International Conference, ISC 2001, Malaga, Spain, October 1-3, 2001, Proceedings, pp. 144-155, 2001, Springer, 3-540-42662-0. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
25 | Satoshi Hada |
Zero-Knowledge and Code Obfuscation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIACRYPT ![In: Advances in Cryptology - ASIACRYPT 2000, 6th International Conference on the Theory and Application of Cryptology and Information Security, Kyoto, Japan, December 3-7, 2000, Proceedings, pp. 443-457, 2000, Springer, 3-540-41404-5. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
24 | Amir Herzberg, Haya Schulmann, Amitabh Saxena, Bruno Crispo |
Towards a Theory of White-Box Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SEC ![In: Emerging Challenges for Security, Privacy and Trust, 24th IFIP TC 11 International Information Security Conference, SEC 2009, Pafos, Cyprus, May 18-20, 2009. Proceedings, pp. 342-352, 2009, Springer, 978-3-642-01243-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
24 | Artem Dinaburg, Paul Royal, Monirul Islam Sharif, Wenke Lee |
Ether: malware analysis via hardware virtualization extensions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 2008 ACM Conference on Computer and Communications Security, CCS 2008, Alexandria, Virginia, USA, October 27-31, 2008, pp. 51-62, 2008, ACM, 978-1-59593-810-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
unpacking, virtualization, dynamic analysis, emulation, malware analysis |
24 | Shafi Goldwasser, Yael Tauman Kalai, Guy N. Rothblum |
One-Time Programs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO 2008, 28th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2008. Proceedings, pp. 39-56, 2008, Springer, 978-3-540-85173-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
24 | Sébastien Josse |
Secure and advanced unpacking using computer emulation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Comput. Virol. ![In: J. Comput. Virol. 3(3), pp. 221-236, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Anti-virus testing, Human driven analysis, Fault injection, Forensics, Software protection, Malware analysis |
24 | Changwei Liu, Sid Stamm |
Fighting unicode-obfuscated spam. ![Search on Bibsonomy](Pics/bibsonomy.png) |
eCrime Researchers Summit ![In: Proceedings of the Anti-Phishing Working Groups 2nd Annual eCrime Researchers Summit 2007, Pittsburgh, Pennsylvania, USA, October 4-5, 2007, pp. 45-59, 2007, ACM. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
SpamAssassin, deobfuscated emails, obfuscated emails, spam emails, unicode characters |
24 | Bobby D. Birrer, Richard A. Raines, Rusty O. Baldwin, Barry E. Mullins, Robert W. Bennington |
Program Fragmentation as a Metamorphic Software Protection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IAS ![In: Proceedings of the Third International Symposium on Information Assurance and Security, IAS 2007, August 29-31, 2007, Manchester, United Kingdom, pp. 369-374, 2007, IEEE Computer Society, 978-0-7695-2876-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
24 | Jeffrey Todd McDonald, Alec Yasinsac |
Applications for Provably Secure Intent Protection with Bounded Input-Size Programs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the The Second International Conference on Availability, Reliability and Security, ARES 2007, The International Dependability Conference - Bridging Theory and Practice, April 10-13 2007, Vienna, Austria, pp. 286-293, 2007, IEEE Computer Society, 0-7695-2775-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
24 | Carole Delporte-Gallet, Hugues Fauconnier, Rachid Guerraoui, Eric Ruppert |
Secretive Birds: Privacy in Population Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
OPODIS ![In: Principles of Distributed Systems, 11th International Conference, OPODIS 2007, Guadeloupe, French West Indies, December 17-20, 2007. Proceedings, pp. 329-342, 2007, Springer, 978-3-540-77095-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
24 | Vijayanand Nagarajan, Rajiv Gupta 0001, Matias Madou, Xiangyu Zhang 0001, Bjorn De Sutter |
Matching Control Flow of Program Versions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICSM ![In: 23rd IEEE International Conference on Software Maintenance (ICSM 2007), October 2-5, 2007, Paris, France, pp. 84-93, 2007, IEEE Computer Society, 978-1-4244-1256-3. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
24 | Anirban Majumdar 0001, Clark D. Thomborson, Stephen Drape |
A Survey of Control-Flow Obfuscations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security, Second International Conference, ICISS 2006, Kolkata, India, December 19-21, 2006, Proceedings, pp. 353-356, 2006, Springer, 3-540-68962-1. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
24 | Jürgen Nützel, Anja Beyer |
How to Increase the Security of Digital Rights Management Systems Without Affecting Consumer's Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ETRICS ![In: Emerging Trends in Information and Communication Security, International Conference, ETRICS 2006, Freiburg, Germany, June 6-9, 2006, Proceedings, pp. 368-380, 2006, Springer, 3-540-34640-6. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
24 | Richard J. Edell, Peter Kruus, Uri Meth |
Tracing HTTP Activity Through Non-cooperating HTTP Proxies (Short Paper). ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICICS ![In: Information and Communications Security, 8th International Conference, ICICS 2006, Raleigh, NC, USA, December 4-7, 2006, Proceedings, pp. 499-506, 2006, Springer, 3-540-49496-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
24 | Ginger Myles, Hongxia Jin |
Self-validating Branch-Based Software Watermarking. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Information Hiding ![In: Information Hiding, 7th International Workshop, IH 2005, Barcelona, Spain, June 6-8, 2005, Revised Selected Papers, pp. 342-356, 2005, Springer, 3-540-29039-7. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
24 | Hideaki Goto, Masahiro Mambo, Hiroki Shizuya, Yasuyoshi Watanabe |
Evaluation of Tamper-Resistant Software Deviating from Structured Programming Rules. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy, 6th Australasian Conference, ACISP 2001, Sydney, Australia, July 11-13, 2001, Proceedings, pp. 145-158, 2001, Springer, 3-540-42300-1. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
17 | P. V. G. D. Prasad Reddy, T. Srinivasa Rao, S. Phani Venkat |
A Threat Free Architecture for Privacy Assurance in Cloud Computing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SERVICES ![In: World Congress on Services, SERVICES 2011, Washington, DC, USA, July 4-9, 2011, pp. 564-568, 2011, IEEE Computer Society, 978-1-4577-0879-4. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
Double Authentication, Hybrid Cloud, Privacy, Network, Obfuscation, Security Management, Plug-in, Cloud Computing Security |
17 | Adam Waksman, Simha Sethumadhavan |
Silencing Hardware Backdoors. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Symposium on Security and Privacy ![In: 32nd IEEE Symposium on Security and Privacy, SP 2011, 22-25 May 2011, Berkeley, California, USA, pp. 49-63, 2011, IEEE Computer Society, 978-1-4577-0147-4. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
security, performance, hardware, obfuscation, triggers, backdoors |
17 | Arun Lakhotia, Davidson R. Boccardo, Anshuman Singh, Aleardo Manacero |
Context-sensitive analysis of obfuscated x86 executables. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PEPM ![In: Proceedings of the 2010 ACM SIGPLAN Workshop on Partial Evaluation and Program Manipulation, PEPM 2010, Madrid, Spain, January 18-19, 2010, pp. 131-140, 2010, ACM, 978-1-60558-727-1. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
analysis of bianries, deobfuscation, obfuscation, context-sensitive analysis |
17 | Jeffrey Todd McDonald, Eric D. Trias, Yong C. Kim, Michael R. Grimaila |
Using logic-based reduction for adversarial component recovery. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAC ![In: Proceedings of the 2010 ACM Symposium on Applied Computing (SAC), Sierre, Switzerland, March 22-26, 2010, pp. 1993-2000, 2010, ACM, 978-1-60558-639-7. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
anti-tamper applications, circuit obfuscation, reverse engineering, intellectual property protection, hardware security |
17 | He Lin, Xuan-sheng Mo, Ying Gao |
Based on RSA and Self-Modifying Mechanism of Software Protection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISPA ![In: IEEE International Symposium on Parallel and Distributed Processing with Applications, ISPA 2010, Taipei, Taiwan, 6-9 September 2010, pp. 474-477, 2010, IEEE Computer Society, 978-1-4244-8095-1. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
register-number, temper-resistance, self-modifying mechanism, software protection, code obfuscation |
17 | John Bethencourt, Dawn Xiaodong Song, Brent Waters |
New Techniques for Private Stream Searching. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Inf. Syst. Secur. ![In: ACM Trans. Inf. Syst. Secur. 12(3), pp. 16:1-16:32, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
private stream searching, public key program obfuscation, Bloom filter, private information retrieval |
17 | Bertrand Anckaert, Mariusz H. Jakubowski, Ramarathnam Venkatesan, Chit Wei Saw |
Runtime Protection via Dataflow Flattening. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SECURWARE ![In: The Third International Conference on Emerging Security Information, Systems and Technologies, SECURWARE 2009, 18-23 June 2009, Athens/Glyfada, Greece, pp. 242-248, 2009, IEEE Computer Society, 978-0-7695-3668-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
security, data hiding, obfuscation, software protection |
17 | Hyoungshick Kim, Joseph Bonneau |
Privacy-enhanced public view for social graphs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIKM-SWSM ![In: Proceedings of the 2nd ACM Workshop on Social Web Search and Mining, CIKM-SWSM 2009, Hong Kong, China, November 2, 2009, pp. 41-48, 2009, ACM, 978-1-60558-806-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
graph obfuscation, public view, privacy, social networks |
17 | Yichi Zhang, Jianmin Pang, Lili Bai, Wen Fu |
Static Analysis of Malware to Detect Exception Return. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IFITA (3) ![In: International Forum on Information Technology and Applications, IFITA 2009, Chengdu, China, 15-17 May 2009, pp. 690-693, 2009, IEEE Computer Society, 978-0-7695-3600-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Malware, Obfuscation, Disassemble |
17 | Vinod P. Nair, Vijay Laxmi, Manoj Singh Gaur, G. V. S. S. Phani Kumar, Yadvendra S. Chundawat |
Static CFG analyzer for metamorphic Malware code. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![In: Proceedings of the 2nd International Conference on Security of Information and Networks, SIN 2009, Gazimagusa, North Cyprus, October 6-10, 2009, pp. 225-228, 2009, ACM, 978-1-60558-412-6. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
metamorphic malware, normalization, obfuscation, control flow graph, longest common subsequence |
17 | JungMin Kang, KiWook Sohn, Soonyoung Jung |
WebVaccine: A Client-Side Realtime Prevention System against Obfuscated Malicious Web Pages. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NCM ![In: International Conference on Networked Computing and Advanced Information Management, NCM 2009, Fifth International Joint Conference on INC, IMS and IDC: INC 2009: International Conference on Networked Computing, IMS 2009: International Conference on Advanced Information Management and Service, IDC 2009: International Conference on Digital Content, Multimedia Technology and its Applications, Seoul, Korea, August 25-27, 2009, pp. 635-637, 2009, IEEE Computer Society, 978-0-7695-3769-6. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
WebVaccine, Web Page, Obfuscation |
17 | Zunping Cheng, Neil Hurley |
Effective diverse and obfuscated attacks on model-based recommender systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RecSys ![In: Proceedings of the 2009 ACM Conference on Recommender Systems, RecSys 2009, New York, NY, USA, October 23-25, 2009, pp. 141-148, 2009, ACM, 978-1-60558-435-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
recommender systems, collaborative filtering, detection, attack, obfuscation |
17 | Yevgeniy Dodis, Yael Tauman Kalai, Shachar Lovett |
On cryptography with auxiliary input. ![Search on Bibsonomy](Pics/bibsonomy.png) |
STOC ![In: Proceedings of the 41st Annual ACM Symposium on Theory of Computing, STOC 2009, Bethesda, MD, USA, May 31 - June 2, 2009, pp. 621-630, 2009, ACM, 978-1-60558-506-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
auxiliary information, encryption schemes, learning parity with noise, error-correcting codes, randomness extractors, code obfuscation |
17 | Mila Dalla Preda, Mihai Christodorescu, Somesh Jha, Saumya K. Debray |
A semantics-based approach to malware detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Program. Lang. Syst. ![In: ACM Trans. Program. Lang. Syst. 30(5), pp. 25:1-25:54, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
abstract interpretation, obfuscation, Malware detection, trace semantics |
17 | Ran Canetti, Susan Hohenberger |
Chosen-ciphertext secure proxy re-encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 2007 ACM Conference on Computer and Communications Security, CCS 2007, Alexandria, Virginia, USA, October 28-31, 2007, pp. 185-194, 2007, ACM, 978-1-59593-703-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
encryption, obfuscation, chosen-ciphertext security, re-encryption |
17 | Brecht Wyseur, Wil Michiels, Paul Gorissen, Bart Preneel |
Cryptanalysis of White-Box DES Implementations with Arbitrary External Encodings. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Selected Areas in Cryptography ![In: Selected Areas in Cryptography, 14th International Workshop, SAC 2007, Ottawa, Canada, August 16-17, 2007, Revised Selected Papers, pp. 264-277, 2007, Springer, 978-3-540-77359-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
White-Box Cryptography, Cryptanalysis, DES, Data Encryption Standard, Obfuscation |
17 | Mila Dalla Preda, Mihai Christodorescu, Somesh Jha, Saumya K. Debray |
A semantics-based approach to malware detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
POPL ![In: Proceedings of the 34th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, POPL 2007, Nice, France, January 17-19, 2007, pp. 377-388, 2007, ACM, 1-59593-575-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
abstract interpretation, obfuscation, malware detection, trace semantics |
17 | Adam J. Lee, Parisa Tabriz, Nikita Borisov |
A privacy-preserving interdomain audit framework. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WPES ![In: Proceedings of the 2006 ACM Workshop on Privacy in the Electronic Society, WPES 2006, Alexandria, VA, USA, October 30, 2006, pp. 99-108, 2006, ACM, 1-59593-556-8. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
data obfuscation, distributed audit, logging |
17 | Bertrand Anckaert, Mariusz H. Jakubowski, Ramarathnam Venkatesan |
Proteus: virtualization for diversified tamper-resistance. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Digital Rights Management Workshop ![In: Proceedings of the Sixth ACM Workshop on Digital Rights Management, Alexandria, VA, USA, October 30, 2006, pp. 47-58, 2006, ACM, 1-59593-555-X. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
virtualization, diversity, copyright protection, intellectual property, obfuscation, tamper-resistance |
17 | Arun Lakhotia, Eric Uday Kumar, Michael Venable |
A Method for Detecting Obfuscated Calls in Malicious Binaries. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Software Eng. ![In: IEEE Trans. Software Eng. 31(11), pp. 955-968, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Invasive software (viruses, worms), abstract stack, validation, program analysis, obfuscation |
17 | Matias Madou, Bertrand Anckaert, Bjorn De Sutter, Koen De Bosschere |
Hybrid static-dynamic attacks against software protection mechanisms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Digital Rights Management Workshop ![In: Proceedings of the Fifth ACM Workshop on Digital Rights Management, Alexandria, VA, USA, November 7, 2005, pp. 75-82, 2005, ACM, 1-59593-230-5. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
watermarking, attacks, intellectual property, obfuscation, software protection, tamper-resistance |
17 | Patrick Cousot, Radhia Cousot |
An abstract interpretation-based framework for software watermarking. ![Search on Bibsonomy](Pics/bibsonomy.png) |
POPL ![In: Proceedings of the 31st ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, POPL 2004, Venice, Italy, January 14-16, 2004, pp. 173-185, 2004, ACM, 1-58113-729-X. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
software authorship, stegoanalyst, stegoattacks, stegokey, stegomark, stegosignature, validation watermarking, authentication, static analysis, abstract interpretation, steganography, fingerprinting, identification, copyrights protection, trustworthiness, obfuscation, intellectual property protection, software watermarking, tamper-proofing |
17 | Elena Gabriela Barrantes, David H. Ackley, Trek S. Palmer, Darko Stefanovic, Dino Dai Zovi |
Randomized instruction set emulation to disrupt binary code injection attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 10th ACM Conference on Computer and Communications Security, CCS 2003, Washington, DC, USA, October 27-30, 2003, pp. 281-289, 2003, ACM, 1-58113-738-9. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
automated diversity, language randomization, security, emulation, information hiding, obfuscation |
17 | Stephen Drape, Oege de Moor, Ganesh Sittampalam |
Transforming the .NET intermediate language using path logic programming. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PPDP ![In: Proceedings of the 4th international ACM SIGPLAN conference on Principles and practice of declarative programming, October 6-8, 2002, Pittsburgh, PA, USA (Affiliated with PLI 2002), pp. 133-144, 2002, ACM. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
compiler optimisations, logic programming, program transformation, program analysis, obfuscation, meta programming |
13 | Shu Hong, Lingjie Duan |
Location Privacy Protection Game Against Adversary Through Multi-User Cooperative Obfuscation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Mob. Comput. ![In: IEEE Trans. Mob. Comput. 23(3), pp. 2066-2077, March 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
13 | Rahul Chaurasia, Anirban Sengupta |
Multi-cut based architectural obfuscation and handprint biometric signature for securing transient fault detectable IP cores during HLS. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Integr. ![In: Integr. 95, pp. 102114, March 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
13 | Md. Moshiur Rahman 0001, Swarup Bhunia |
Practical Implementation of Robust State-Space Obfuscation for Hardware IP Protection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Very Large Scale Integr. Syst. ![In: IEEE Trans. Very Large Scale Integr. Syst. 32(2), pp. 333-346, February 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
13 | Prabhdeep Singh, Pawan Singh, Abhay Kumar Agarwal |
Improved encryption and obfuscation process of lightweight secured auditable cloud storage with data dynamics. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Multim. Tools Appl. ![In: Multim. Tools Appl. 83(13), pp. 37687-37711, April 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
13 | Yuval Ishai, Alexis Korb, Paul Lou, Amit Sahai |
Beyond the Csiszár-Körner Bound: Best-Possible Wiretap Coding via Obfuscation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Cryptol. ![In: J. Cryptol. 37(1), pp. 1, March 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
13 | Aditi Roy, Kokila Jagadeesh, Ramasubramanian Natarajan, B. Shameedha Begum |
OTK-based PUF CRP obfuscation for IoT device authentication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Microelectron. J. ![In: Microelectron. J. 144, pp. 106070, February 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
13 | Hideaki Takahashi, Alex Fukunaga |
On the Transit Obfuscation Problem. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2402.07420, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
13 | James Bartusek, Zvika Brakerski, Vinod Vaikuntanathan |
Quantum State Obfuscation from Classical Oracles. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2401.10200, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
13 | Tanvir Hossain, Matthew Showers, Mahmudul Hasan 0012, Tamzidul Hoque |
HOACS: Homomorphic Obfuscation Assisted Concealing of Secrets to Thwart Trojan Attacks in COTS Processor. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2402.09701, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
13 | Filip Ilic, He Zhao 0004, Thomas Pock, Richard P. Wildes |
Selective, Interpretable, and Motion Consistent Privacy Attribute Obfuscation for Action Recognition. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2403.12710, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
13 | Dominik Macko, Róbert Móro, Adaku Uchendu, Ivan Srba, Jason Samuel Lucas, Michiharu Yamashita, Nafis Irtiza Tripto, Dongwon Lee 0001, Jakub Simko, Mária Bieliková |
Authorship Obfuscation in Multilingual Machine-Generated Text Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2401.07867, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
13 | Songjie Xie, Youlong Wu, Jiaxuan Li, Ming Ding 0001, Khaled B. Letaief |
Privacy for Fairness: Information Obfuscation for Fair Representation Learning with Local Differential Privacy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2402.10473, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
13 | Brian Etter, James Lee Hu, Mohammedreza Ebrahimi, Weifeng Li 0002, Xin Li 0108, Hsinchun Chen |
Evading Deep Learning-Based Malware Detectors via Obfuscation: A Deep Reinforcement Learning Approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2402.02600, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
13 | Yixiang Yao, Fei Wang, Srivatsan Ravi, Muhao Chen |
Privacy-Preserving Language Model Inference with Instance Obfuscation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2402.08227, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
13 | Haoran Geng, Yuezhi Che, Aaron Dingler, Michael T. Niemier, Xiaobo Sharon Hu |
A New Secure Memory System for Efficient Data Protection and Access Pattern Obfuscation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2402.15824, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
13 | Eric Xing, Saranya Venkatraman, Thai Le, Dongwon Lee 0001 |
ALISON: Fast and Effective Stylometric Authorship Obfuscation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2402.00835, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
13 | Håkon Harnes, Donn Morrison |
Cryptic Bytes: WebAssembly Obfuscation for Evading Cryptojacking Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2403.15197, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
13 | Jillian Fisher, Ximing Lu, Jaehun Jung, Liwei Jiang, Zaïd Harchaoui, Yejin Choi 0001 |
JAMDEC: Unsupervised Authorship Obfuscation using Constrained Decoding over Small Language Models. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2402.08761, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
13 | Serhat Bakirtas, Elza Erkip |
Distribution-Agnostic Database De-Anonymization Under Obfuscation And Synchronization Errors. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2404.01366, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
13 | Aayush Jain, Huijia Lin, Amit Sahai |
Indistinguishability Obfuscation from Well-Founded Assumptions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Commun. ACM ![In: Commun. ACM 67(3), pp. 97-105, March 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
13 | Hassan Jameel Asghar, Benjamin Zi Hao Zhao, Muhammad Ikram 0001, Giang Linh Duc Nguyen, Dali Kaafar, Sean Lamont, Daniel Coscia |
Use of cryptography in malware obfuscation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Comput. Virol. Hacking Tech. ![In: J. Comput. Virol. Hacking Tech. 20(1), pp. 135-152, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
13 | Kimia Zamiri Azar, Hadi Mardani Kamali, Farimah Farahmandi, Mark M. Tehranipoor |
Improving Bounded Model Checkers Scalability for Circuit De-Obfuscation: An Exploration. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Inf. Forensics Secur. ![In: IEEE Trans. Inf. Forensics Secur. 19, pp. 2771-2785, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
13 | Chongyao Xu, Litao Zhang, Pui-In Mak, Rui Paulo Martins, Man-Kay Law |
Fully Symmetrical Obfuscated Interconnection and Weak-PUF-Assisted Challenge Obfuscation Strong PUFs Against Machine-Learning Modeling Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Inf. Forensics Secur. ![In: IEEE Trans. Inf. Forensics Secur. 19, pp. 3927-3942, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
13 | Darius Mercadier, Viet Sang Nguyen, Matthieu Rivain, Aleksei Udovenko |
OBSCURE: Versatile Software Obfuscation from a Lightweight Secure Element. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Trans. Cryptogr. Hardw. Embed. Syst. ![In: IACR Trans. Cryptogr. Hardw. Embed. Syst. 2024(2), pp. 588-629, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
13 | Shun Zhang 0002, Pengfei Lan, Benfei Duan, Zhili Chen, Hong Zhong 0001, Neal N. Xiong |
DPIVE: A Regionalized Location Obfuscation Scheme with Personalized Privacy Levels. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Sens. Networks ![In: ACM Trans. Sens. Networks 20(2), pp. 35:1-35:26, March 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
13 | Zhuang Shan, Leyou Zhang, Qing Wu 0005 |
Heuristic Ideal Obfuscation Scheme based on LWE Problem, its Variants and Quantum Oracle. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2024, pp. 392, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP BibTeX RDF |
|
13 | Ran Canetti, Claudio Chamon, Eduardo R. Mucciolo, Andrei E. Ruckenstein |
Towards general-purpose program obfuscation via local mixing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2024, pp. 6, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP BibTeX RDF |
|
13 | Brent Waters, David J. Wu 0001 |
Adaptively-Sound Succinct Arguments for NP from Indistinguishability Obfuscation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2024, pp. 165, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP BibTeX RDF |
|
13 | Kaartik Bhushan, Sai Lakshmi Bhavana Obbattu, Manoj Prabhakaran 0001, Rajeev Raghunath |
R3PO: Reach-Restricted Reactive Program Obfuscation and its Application to MA-ABE. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2024, pp. 119, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP BibTeX RDF |
|
13 | Fangqi Dong, Zihan Hao, Ethan Mook, Daniel Wichs |
Laconic Function Evaluation, Functional Encryption and Obfuscation for RAMs with Sublinear Computation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2024, pp. 68, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP BibTeX RDF |
|
13 | Darius Mercadier, Viet Sang Nguyen, Matthieu Rivain, Aleksei Udovenko |
OBSCURE: Versatile Software Obfuscation from a Lightweight Secure Element. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2024, pp. 77, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP BibTeX RDF |
|
13 | James Bartusek, Zvika Brakerski, Vinod Vaikuntanathan |
Quantum State Obfuscation from Classical Oracles. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2024, pp. 82, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP BibTeX RDF |
|
13 | Ikram Ullah 0001, Munam Ali Shah |
SGO: Semantic Group Obfuscation for Location-Based Services in VANETS. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Sensors ![In: Sensors 24(4), pp. 1145, February 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
13 | Navid Rezazadeh, Solmaz S. Kia |
A Study of Privacy Preservation in Average Consensus Algorithm via Deterministic Obfuscation Signals. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Control. Netw. Syst. ![In: IEEE Trans. Control. Netw. Syst. 11(1), pp. 534-546, March 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
13 | Kaartik Bhushan, Venkata Koppula, Manoj Prabhakaran 0001 |
Homomorphic Indistinguishability Obfuscation and Its Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ITCS ![In: 15th Innovations in Theoretical Computer Science Conference, ITCS 2024, January 30 to February 2, 2024, Berkeley, CA, USA, pp. 14:1-14:21, 2024, Schloss Dagstuhl - Leibniz-Zentrum für Informatik, 978-3-95977-309-6. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
13 | Naiqian Zhang, Zheyun Feng, Dongpeng Xu 0001 |
An In-Depth Analysis of the Code-Reuse Gadgets Introduced by Software Obfuscation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACNS (3) ![In: Applied Cryptography and Network Security - 22nd International Conference, ACNS 2024, Abu Dhabi, United Arab Emirates, March 5-8, 2024, Proceedings, Part III, pp. 217-240, 2024, Springer, 978-3-031-54775-1. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
13 | Adrian Swindle, Derrick McNealy, Giri P. Krishnan, Ramyaa Ramyaa |
Evaluation of Large Language Models on Code Obfuscation (Student Abstract). ![Search on Bibsonomy](Pics/bibsonomy.png) |
AAAI ![In: Thirty-Eighth AAAI Conference on Artificial Intelligence, AAAI 2024, Thirty-Sixth Conference on Innovative Applications of Artificial Intelligence, IAAI 2024, Fourteenth Symposium on Educational Advances in Artificial Intelligence, EAAI 2014, February 20-27, 2024, Vancouver, Canada, pp. 23664-23666, 2024, AAAI Press. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
13 | Eric Xing, Saranya Venkatraman, Thai Le, Dongwon Lee 0001 |
ALISON: Fast and Effective Stylometric Authorship Obfuscation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AAAI ![In: Thirty-Eighth AAAI Conference on Artificial Intelligence, AAAI 2024, Thirty-Sixth Conference on Innovative Applications of Artificial Intelligence, IAAI 2024, Fourteenth Symposium on Educational Advances in Artificial Intelligence, EAAI 2014, February 20-27, 2024, Vancouver, Canada, pp. 19315-19322, 2024, AAAI Press. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
13 | Kaartik Bhushan, Sai Lakshmi Bhavana Obbattu, Manoj Prabhakaran 0001, Rajeev Raghunath |
R3PO: Reach-Restricted Reactive Program Obfuscation and Its Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography (3) ![In: Public-Key Cryptography - PKC 2024 - 27th IACR International Conference on Practice and Theory of Public-Key Cryptography, Sydney, NSW, Australia, April 15-17, 2024, Proceedings, Part III, pp. 61-91, 2024, Springer, 978-3-031-57724-6. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
13 | Guglielmo Faggioli, Nicola Ferro 0001 |
Query Obfuscation for Information Retrieval Through Differential Privacy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ECIR (1) ![In: Advances in Information Retrieval - 46th European Conference on Information Retrieval, ECIR 2024, Glasgow, UK, March 24-28, 2024, Proceedings, Part I, pp. 278-294, 2024, Springer, 978-3-031-56026-2. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
13 | Haimanti Chakraborty, Ranga Vemuri |
ROBUST: RTL OBfuscation USing Bi-functional Polymorphic OperaTors. ![Search on Bibsonomy](Pics/bibsonomy.png) |
VLSID ![In: 37th International Conference on VLSI Design and 23rd International Conference on Embedded Systems, VLSID 2024, Kolkata, India, January 6-10, 2024, pp. 499-504, 2024, IEEE, 979-8-3503-8440-6. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|