Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
13 | Saravana Murthy Palanisamy |
Towards Multiple Pattern Type Privacy Protection in Complex Event Processing Through Event Obfuscation Strategies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DPM/CBT@ESORICS ![In: Data Privacy Management, Cryptocurrencies and Blockchain Technology - ESORICS 2020 International Workshops, DPM 2020 and CBT 2020, Guildford, UK, September 17-18, 2020, Revised Selected Papers, pp. 178-194, 2020, Springer, 978-3-030-66171-7. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
13 | Jianguo Jiang, Gengwang Li, Min Yu 0001, Gang Li 0009, Chao Liu 0020, Zhiqiang Lv, Bin Lv, Weiqing Huang |
Similarity of Binaries Across Optimization Levels and Obfuscation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS (1) ![In: Computer Security - ESORICS 2020 - 25th European Symposium on Research in Computer Security, ESORICS 2020, Guildford, UK, September 14-18, 2020, Proceedings, Part I, pp. 295-315, 2020, Springer, 978-3-030-58950-9. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
13 | Sara Bernardini, Fabio Fagnani, Santiago Franco |
An Optimization Approach to Robust Goal Obfuscation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
KR ![In: Proceedings of the 17th International Conference on Principles of Knowledge Representation and Reasoning, KR 2020, Rhodes, Greece, September 12-18, 2020., pp. 119-129, 2020, 978-0-9992411-7-2. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
13 | Shervin Roshanisefat, Hadi Mardani Kamali, Kimia Zamiri Azar, Sai Manoj Pudukotai Dinakarrao, Naghmeh Karimi, Houman Homayoun, Avesta Sasan |
DFSSD: Deep Faults and Shallow State Duality, A Provably Strong Obfuscation Solution for Circuits with Restricted Access to Scan Chain. ![Search on Bibsonomy](Pics/bibsonomy.png) |
VTS ![In: 38th IEEE VLSI Test Symposium, VTS 2020, San Diego, CA, USA, April 5-8, 2020, pp. 1-6, 2020, IEEE, 978-1-7281-5359-9. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
13 | Ruizhe Qin, Hao Han |
BinSEAL: Linux Binary Obfuscation Against Symbolic Execution. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SpaCCS Workshops ![In: Security, Privacy, and Anonymity in Computation, Communication, and Storage - SpaCCS 2020 International Workshops, Nanjing, China, December 18-20, 2020, Proceedings, pp. 65-76, 2020, Springer, 978-3-030-68883-7. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
13 | Geoffrey Hecht, Cyprien Neverov, Alexandre Bergel |
Vision: alleviating Android developer burden on obfuscation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MOBILESoft@ICSE ![In: MOBILESoft '20: IEEE/ACM 7th International Conference on Mobile Software Engineering and Systems, Seoul, Republic of Korea, July 13-15, 2020, pp. 137-141, 2020, ACM, 978-1-4503-7959-5. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
13 | Hao Wang, Wenyan Liu 0001, Xiaoling Wang, Yingjie Zhang |
Global and Personalized Query Probability for Obfuscation-Based Web Search. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICKG ![In: 2020 IEEE International Conference on Knowledge Graph, ICKG 2020, Online, August 9-11, 2020, pp. 259-266, 2020, IEEE, 978-1-7281-8156-1. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
13 | Giuseppe Crincoli, Tiziano Marinaro, Fabio Martinelli, Francesco Mercaldo, Antonella Santone |
Code Reordering Obfuscation Technique Detection by Means of Weak Bisimulation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AINA ![In: Advanced Information Networking and Applications - Proceedings of the 34th International Conference on Advanced Information Networking and Applications, AINA-2020, Caserta, Italy, 15-17 April., pp. 1368-1382, 2020, Springer, 978-3-030-44040-4. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
13 | Arjun Singh Chauhan, Vineet Sahula, A. S. Mandal, Abhigyan Dutta |
Intensifying Challenge Obfuscation by Cascading FPGA RO-PUFs for Random Number Generation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
VLSID ![In: 33rd International Conference on VLSI Design and 19th International Conference on Embedded Systems, VLSID 2020, Bangalore, India, January 4-8, 2020, pp. 195-200, 2020, IEEE, 978-1-7281-5701-6. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
13 | Rhys Compton, Eibe Frank, Panos Patros, Abigail Koay |
Embedding Java Classes with code2vec: Improvements from Variable Obfuscation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MSR ![In: MSR '20: 17th International Conference on Mining Software Repositories, Seoul, Republic of Korea, 29-30 June, 2020, pp. 243-253, 2020, ACM, 978-1-4503-7517-7. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
13 | Rajesh Jayaram, David P. Woodruff, Qiuyi Zhang 0001 |
Span Recovery for Deep Neural Networks with Applications to Input Obfuscation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICLR ![In: 8th International Conference on Learning Representations, ICLR 2020, Addis Ababa, Ethiopia, April 26-30, 2020, 2020, OpenReview.net. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP BibTeX RDF |
|
13 | Adrian Herrera |
Optimizing Away JavaScript Obfuscation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCAM ![In: 20th IEEE International Working Conference on Source Code Analysis and Manipulation, SCAM 2020, Adelaide, Australia, September 28 - October 2, 2020, pp. 215-220, 2020, IEEE, 978-1-7281-9248-2. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
13 | Salsabil Hamadache, Malte Elson |
Creative Manual Code Obfuscation as a Countermeasure Against Software Reverse Engineering. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AHFE (19) ![In: Advances in Human Factors in Cybersecurity - AHFE 2020 Virtual Conference on Human Factors in Cybersecurity, July 16-20, 2020, USA, pp. 3-8, 2020, Springer, 978-3-030-52580-4. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
13 | Hsiang Hsu, Shahab Asoodeh, Flávio P. Calmon |
Obfuscation via Information Density Estimation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AISTATS ![In: The 23rd International Conference on Artificial Intelligence and Statistics, AISTATS 2020, 26-28 August 2020, Online [Palermo, Sicily, Italy], pp. 906-917, 2020, PMLR. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP BibTeX RDF |
|
13 | Shaown Sarker, Jordan Jueckstock, Alexandros Kapravelos |
Hiding in Plain Site: Detecting JavaScript Obfuscation through Concealed Browser API Usage. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Internet Measurement Conference ![In: IMC '20: ACM Internet Measurement Conference, Virtual Event, USA, October 27-29, 2020, pp. 648-661, 2020, ACM, 978-1-4503-8138-3. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
13 | Anagha Kulkarni 0002, Siddharth Srivastava 0001, Subbarao Kambhampati |
Signaling Friends and Head-Faking Enemies Simultaneously: Balancing Goal Obfuscation and Goal Legibility. (PDF / PS) ![Search on Bibsonomy](Pics/bibsonomy.png) |
AAMAS ![In: Proceedings of the 19th International Conference on Autonomous Agents and Multiagent Systems, AAMAS '20, Auckland, New Zealand, May 9-13, 2020, pp. 1889-1891, 2020, International Foundation for Autonomous Agents and Multiagent Systems, 978-1-4503-7518-4. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP BibTeX RDF |
|
13 | Qing Ren, Feng Tian 0004, Laifeng Lu |
Secure Spatial Query Scheme with Access Pattern Obfuscation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NaNA ![In: International Conference on Networking and Network Applications, NaNA 2020, Haikou City, China, December 10-13, 2020, pp. 221-228, 2020, IEEE, 978-1-7281-8954-3. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
13 | Asad Mahmood, Zubair Shafiq, Padmini Srinivasan |
A Girl Has A Name: Detecting Authorship Obfuscation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACL ![In: Proceedings of the 58th Annual Meeting of the Association for Computational Linguistics, ACL 2020, Online, July 5-10, 2020, pp. 2235-2245, 2020, Association for Computational Linguistics, 978-1-952148-25-5. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
13 | Eric Martin Demer |
Zero-Knowledge and Obfuscation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
|
2020 |
RDF |
|
13 | Anuj Shanker Saxena, Debajyoti Bera, Vikram Goyal |
Modeling location obfuscation for continuous query. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Inf. Secur. Appl. ![In: J. Inf. Secur. Appl. 44, pp. 130-143, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
13 | Angus M. Marshall, Peter Miller |
CaseNote: Mobile phone call data obfuscation & techniques for call correlation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Digit. Investig. ![In: Digit. Investig. 29, pp. 82-90, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
13 | Hamza Al Maharmeh, Mohammad Alhawari, Chung-Chih Hung, Mohammed Ismail 0001 |
Hardware security threats and countermeasures: a study of obfuscation, camouflaging and PUFs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Multim. Intell. Secur. ![In: Int. J. Multim. Intell. Secur. 3(3), pp. 271-292, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
13 | Md Shahed Enamul Quadir, John A. Chandy |
Key Generation for Hardware Obfuscation Using Strong PUFs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Cryptogr. ![In: Cryptogr. 3(3), pp. 17, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
13 | Nisarg Raval, Ashwin Machanavajjhala, Jerry Pan |
Olympus: Sensor Privacy through Utility Aware Obfuscation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Proc. Priv. Enhancing Technol. ![In: Proc. Priv. Enhancing Technol. 2019(1), pp. 5-25, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
13 | Asad Mahmood, Faizan Ahmad, Zubair Shafiq, Padmini Srinivasan, Fareed Zaffar |
A Girl Has No Name: Automated Authorship Obfuscation using Mutant-X. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Proc. Priv. Enhancing Technol. ![In: Proc. Priv. Enhancing Technol. 2019(4), pp. 54-71, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
13 | Pratiksha Gautam, Mohd. Dilshad Ansari, Surender Kumar Sharma |
Enhanced Security for Electronic Health Care Information Using Obfuscation and RSA Algorithm in Cloud Computing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Inf. Secur. Priv. ![In: Int. J. Inf. Secur. Priv. 13(1), pp. 59-69, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
13 | Guang Sun, F. Xiaoping, Wangdong Jiang, L. Fenghua, J. Yuewei |
Obfuscation-Based Watermarking for Mobile Service Application Copyright Protection in the Cloud. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Access ![In: IEEE Access 7, pp. 38162-38167, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
13 | Shengzhou Hu, Jiguo Li 0001, Yichen Zhang 0003 |
A Dispersed Multi-Value Attribute-Based Encryption With Mediated Obfuscation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Access ![In: IEEE Access 7, pp. 84866-84875, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
13 | Chengyu Hu, Pengtao Liu, Rupeng Yang, Yan Xu |
Public-Key Encryption With Keyword Search via Obfuscation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Access ![In: IEEE Access 7, pp. 37394-37405, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
13 | Benjamin Cyr, Jubayer Mahmod, Ujjwal Guin |
Low-Cost and Secure Firmware Obfuscation Method for Protecting Electronic Systems From Cloning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Internet Things J. ![In: IEEE Internet Things J. 6(2), pp. 3700-3711, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
13 | James Chacko, Kyle Juretus, Marko Jacovic, Cem Sahin, Nagarajan Kandasamy, Ioannis Savidis, Kapil R. Dandekar |
Securing Wireless Communication via Hardware-Based Packet Obfuscation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Hardw. Syst. Secur. ![In: J. Hardw. Syst. Secur. 3(3), pp. 261-272, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
13 | Dana Dachman-Soled, S. Dov Gordon, Feng-Hao Liu, Adam O'Neill, Hong-Sheng Zhou |
Leakage Resilience from Program Obfuscation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Cryptol. ![In: J. Cryptol. 32(3), pp. 742-824, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
13 | Minjae Park, Geunha You, Seong-je Cho, Minkyu Park, Sangchul Han |
A Framework for Identifying Obfuscation Techniques applied to Android Apps using Machine Learning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. ![In: J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 10(4), pp. 22-30, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
13 | Xinmiao Zhang, Yingjie Lao |
On the Construction of Composite Finite Fields for Hardware Obfuscation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Computers ![In: IEEE Trans. Computers 68(9), pp. 1353-1364, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
13 | Xueyan Wang, Qiang Zhou 0001, Yici Cai, Gang Qu 0001 |
Toward a Formal and Quantitative Evaluation Framework for Circuit Obfuscation Methods. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. ![In: IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 38(10), pp. 1844-1857, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
13 | Anirban Sengupta, Deepak Kachave, Dipanjan Roy |
Low Cost Functional Obfuscation of Reusable IP Ores Used in CE Hardware Through Robust Locking. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. ![In: IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 38(4), pp. 604-616, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
13 | Jianlei Yang 0001, Xueyan Wang, Qiang Zhou 0001, Zhaohao Wang, Hai Li 0001, Yiran Chen 0001, Weisheng Zhao |
Exploiting Spin-Orbit Torque Devices As Reconfigurable Logic for Circuit Obfuscation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. ![In: IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 38(1), pp. 57-69, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
13 | Vinita Daiya, Jemimah Ebenezer, Shri R. Jehadeesan |
Security Implementation in Wireless Sensor Network by RF Signal Obfuscation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Wirel. Pers. Commun. ![In: Wirel. Pers. Commun. 106(2), pp. 805-827, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
13 | Xiaotong Cui, Jeff Jun Zhang, Kaijie Wu 0001, Siddharth Garg, Ramesh Karri |
Split Manufacturing-Based Register Transfer-Level Obfuscation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM J. Emerg. Technol. Comput. Syst. ![In: ACM J. Emerg. Technol. Comput. Syst. 15(1), pp. 11:1-11:22, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
13 | Kaveh Shamsi, Meng Li 0004, Kenneth Plaks, Saverio Fazzari, David Z. Pan, Yier Jin |
IP Protection and Supply Chain Security through Logic Obfuscation: A Systematic Overview. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Design Autom. Electr. Syst. ![In: ACM Trans. Design Autom. Electr. Syst. 24(6), pp. 65:1-65:36, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
13 | Anirban Sengupta, Mahendra Rathor |
Protecting DSP Kernels Using Robust Hologram-Based Obfuscation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Consumer Electron. ![In: IEEE Trans. Consumer Electron. 65(1), pp. 99-108, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
13 | Rami Puzis, Hadar Polad, Bracha Shapira |
Attack Graph Obfuscation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1903.02601, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP BibTeX RDF |
|
13 | Siddhartha Datta |
DeepObfusCode: Source Code Obfuscation Through Sequence-to-Sequence Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1909.01837, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP BibTeX RDF |
|
13 | Mohsen Ahmadvand, Daniel Below, Sebastian Banescu, Alexander Pretschner |
VirtSC: Combining Virtualization Obfuscation with Self-Checksumming. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1909.11404, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP BibTeX RDF |
|
13 | Novak Boskov, Mihailo Isakov, Michel A. Kinsy |
CodeTrolley: Hardware-Assisted Control Flow Obfuscation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1903.00841, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP BibTeX RDF |
|
13 | Terrence W. K. Mak, Ferdinando Fioretto, Pascal Van Hentenryck |
Privacy-Preserving Obfuscation for Distributed Power Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1910.04250, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP BibTeX RDF |
|
13 | Ferdinando Fioretto, Terrence W. K. Mak, Pascal Van Hentenryck |
Privacy-Preserving Obfuscation of Critical Infrastructure Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1905.09778, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP BibTeX RDF |
|
13 | Novak Boskov, Mihailo Isakov, Michel A. Kinsy |
Drndalo: Lightweight Control Flow Obfuscation Through Minimal Processor/Compiler Co-Design. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1912.01560, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP BibTeX RDF |
|
13 | Carina Wiesen, Nils Albartus, Max Hoffmann 0001, Steffen Becker 0003, Sebastian Wallat, Marc Fyrbiak, Nikol Rummel, Christof Paar |
Towards Cognitive Obfuscation: Impeding Hardware Reverse Engineering Based on Psychological Insights. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1910.00323, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP BibTeX RDF |
|
13 | Dixing Xu, Mengyao Zheng, Linshan Jiang, Chaojie Gu, Rui Tan 0001, Peng Cheng 0001 |
Lightweight and Unobtrusive Privacy Preservation for Remote Inference via Edge Data Obfuscation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1912.09859, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP BibTeX RDF |
|
13 | Lilas Alrahis, Muhammad Yasin, Nimisha Limaye, Hani H. Saleh, Baker Mohammad, Mahmoud Al-Qutayri, Ozgur Sinanoglu |
ScanSAT: Unlocking Static and Dynamic Scan Obfuscation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1909.04428, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP BibTeX RDF |
|
13 | Peter T. Breuer |
Chaotic Compilation for Encrypted Computing: Obfuscation but Not in Name. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1904.09429, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP BibTeX RDF |
|
13 | Ramtine Tofighi-Shirazi, Irina Mariuca Asavoae, Philippe Elbaz-Vincent |
Fine-Grained Static Detection of Obfuscation Transforms Using Ensemble-Learning and Semantic Reasoning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1911.07523, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP BibTeX RDF |
|
13 | Zhifeng Hu, Serhii Havrylov, Ivan Titov, Shay B. Cohen |
Obfuscation for Privacy-preserving Syntactic Parsing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1904.09585, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP BibTeX RDF |
|
13 | Hsiang Hsu, Shahab Asoodeh, Flávio du Pin Calmon |
Obfuscation via Information Density Estimation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1910.08109, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP BibTeX RDF |
|
13 | Arunkumar Vijayakumar, Vinay C. Patil, Daniel E. Holcomb, Christof Paar, Sandip Kundu |
Physical Design Obfuscation of Hardware: A Comprehensive Investigation of Device- and Logic-Level Techniques. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1910.00981, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP BibTeX RDF |
|
13 | Kimia Zamiri Azar, Farnoud Farahmand, Hadi Mardani Kamali, Shervin Roshanisefat, Houman Homayoun, William Diehl, Kris Gaj, Avesta Sasan |
COMA: Communication and Obfuscation Management Architecture. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1909.00493, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP BibTeX RDF |
|
13 | Alberto Redondo, David Ríos Insua |
Protecting from Malware Obfuscation Attacks through Adversarial Risk Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1911.03653, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP BibTeX RDF |
|
13 | Zimu Guo, Xiaolin Xu, Mark M. Tehranipoor, Domenic Forte |
EOP: An Encryption-Obfuscation Solution for Protecting PCBs Against Tampering and Reverse Engineering. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1904.09516, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP BibTeX RDF |
|
13 | Denis Ugarte, Davide Maiorca, Fabrizio Cara, Giorgio Giacinto |
PowerDrive: Accurate De-Obfuscation and Analysis of PowerShell Malware. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1904.10270, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP BibTeX RDF |
|
13 | Ferdinando Fioretto, Terrence W. K. Mak, Pascal Van Hentenryck |
Differential Privacy for Power Grid Obfuscation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1901.06949, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP BibTeX RDF |
|
13 | Indu Ilanchezian, Praneeth Vepakomma, Abhishek Singh 0005, Otkrist Gupta, G. N. Srinivasa Prasanna, Ramesh Raskar |
Maximal adversarial perturbations for obfuscation: Hiding certain attributes while preserving rest. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1909.12734, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP BibTeX RDF |
|
13 | Muhammad Ikram 0001, Pierrick Beaume, Mohamed Ali Kâafar |
DaDiDroid: An Obfuscation Resilient Tool for Detecting Android Malware via Weighted Directed Call Graph Modelling. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1905.09136, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP BibTeX RDF |
|
13 | Anagha Kulkarni 0002, Siddharth Srivastava 0001, Subbarao Kambhampati |
Balancing Goal Obfuscation and Goal Legibility in Settings with Cooperative and Adversarial Observers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1905.10672, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP BibTeX RDF |
|
13 | Peter T. Breuer |
Compiled Obfuscation for Data Structures in Encrypted Computing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1902.06146, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP BibTeX RDF |
|
13 | Alireza Mohammadinodooshan, Ulf Kargén, Nahid Shahmehri |
Comment on "AndrODet: An adaptive Android obfuscation detector". ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1910.06192, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP BibTeX RDF |
|
13 | Yusuke Kawamoto 0001, Takao Murakami |
Local Distribution Obfuscation via Probability Coupling. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1907.05991, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP BibTeX RDF |
|
13 | Satwik Patnaik, Mohammed Ashraf, Ozgur Sinanoglu, Johann Knechtel |
A Modern Approach to IP Protection and Trojan Prevention: Split Manufacturing for 3D ICs and Obfuscation of Vertical Interconnects. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1908.03925, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP BibTeX RDF |
|
13 | Preetha Thulasiraman, Thomas Haakensen, Audrey F. Callanan |
Countering passive cyber attacks against sink nodes in tactical sensor networks using reactive route obfuscation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Netw. Comput. Appl. ![In: J. Netw. Comput. Appl. 132, pp. 10-21, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
13 | Huang Zhang, Fangguo Zhang, Rong Cheng, Haibo Tian |
Efficient obfuscation for CNF circuits and applications in cloud computing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Soft Comput. ![In: Soft Comput. 23(6), pp. 2061-2072, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
13 | Omid Mirzaei, José María de Fuentes, Juan E. Tapiador, Lorena González-Manzano |
AndrODet: An adaptive Android obfuscation detector. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Future Gener. Comput. Syst. ![In: Future Gener. Comput. Syst. 90, pp. 240-261, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
13 | Lakshminarayanan Nandakumar, Gamze Tillem, Zekeriya Erkin, Tamás Keviczky |
Protecting the grid topology and user consumption patterns during state estimation in smart grids based on data obfuscation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Energy Inform. ![In: Energy Inform. 2(S1), 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
13 | Amin Rezaei 0001, Yuanqi Shen, Hai Zhou 0001 |
Rescuing Logic Encryption in Post-SAT Era by Locking & Obfuscation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2019, pp. 1463, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP BibTeX RDF |
|
13 | Jiseung Kim 0001, Changmin Lee 0001 |
Cryptanalysis of FRS Obfuscation based on the CLT13 Multilinear Map. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2019, pp. 1254, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP BibTeX RDF |
|
13 | Dennis Hofheinz, Bogdan Ursu |
Dual-Mode NIZKs from Obfuscation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2019, pp. 475, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP BibTeX RDF |
|
13 | Fatemeh Ganji, Shahin Tajik, Domenic Forte, Jean-Pierre Seifert |
Blockchain-enabled Cryptographically-secure Hardware Obfuscation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2019, pp. 928, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP BibTeX RDF |
|
13 | Abhishek Chakraborty 0001, Ankur Srivastava 0001 |
Hardware-Software Co-Design Based Obfuscation of Hardware Accelerators. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2019, pp. 1040, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP BibTeX RDF |
|
13 | Rishab Goyal, Venkata Koppula, Satyanarayana Vusirikala, Brent Waters |
On Perfect Correctness in (Lockable) Obfuscation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2019, pp. 1010, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP BibTeX RDF |
|
13 | Prabhanjan Ananth, Aayush Jain, Huijia Lin, Christian Matt 0002, Amit Sahai |
Indistinguishability Obfuscation Without Multilinear Maps: New Paradigms via Low Degree Weak Pseudorandomness and Security Amplification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2019, pp. 643, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP BibTeX RDF |
|
13 | Marc Fyrbiak, Sebastian Wallat, Jonathan Déchelotte, Nils Albartus, Sinan Böcker, Russell Tessier, Christof Paar |
On the Difficulty of FSM-based Hardware Obfuscation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2019, pp. 1163, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP BibTeX RDF |
|
13 | Peter T. Breuer |
An Information Obfuscation Calculus for Encrypted Computing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2019, pp. 84, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP BibTeX RDF |
|
13 | Yilei Chen 0001, Minki Hhan, Vinod Vaikuntanathan, Hoeteck Wee |
Matrix PRFs: Constructions, Attacks, and Applications to Obfuscation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2019, pp. 1085, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP BibTeX RDF |
|
13 | Allison Bishop, Lucas Kowalczyk, Tal Malkin, Valerio Pastro, Mariana Raykova 0001, Kevin Shi |
In Pursuit of Clarity In Obfuscation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2019, pp. 463, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP BibTeX RDF |
|
13 | Peter T. Breuer |
Chaotic Compilation for Encrypted Computing: Obfuscation but Not in Name. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2019, pp. 423, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP BibTeX RDF |
|
13 | Dasari Yakobu, Hemantha Kumar Kalluri, Venkatesulu Dondeti |
An Enhanced Secure, Robust and Efficient Crypto Scheme for Ensuring Data Privacy in Public Cloud Using Obfuscation & Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Ingénierie des Systèmes d Inf. ![In: Ingénierie des Systèmes d Inf. 24(6), pp. 603-609, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
13 | Qing Su, Zeming Lin, Zhiyi Lin, Jianfeng Huang |
基于非线性模糊矩阵的代码混淆有效性评估模型 (Code Obfuscation Effectiveness Assessment Model Based on Nonlinear Fuzzy Matrices). ![Search on Bibsonomy](Pics/bibsonomy.png) |
计算机科学 ![In: 计算机科学 46(4), pp. 197-202, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
13 | Ranyiliu Chen, Tao Shang, Jianwei Liu 0001 |
IND-secure quantum symmetric encryption based on point obfuscation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Quantum Inf. Process. ![In: Quantum Inf. Process. 18(6), pp. 161, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
13 | Binlin Cheng, Jinjun Liu, Jiejie Chen, Shudong Shi, Xufu Peng, Xingwen Zhang, Haiqing Hai |
MoG: Behavior-Obfuscation Resistance Malware Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. J. ![In: Comput. J. 62(12), pp. 1734-1747, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
13 | Mohsen Ahmadvand, Daniel Below, Sebastian Banescu, Alexander Pretschner |
VirtSC: Combining Virtualization Obfuscation with Self-Checksumming. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SPRO@CCS ![In: Proceedings of the 3rd ACM Workshop on Software Protection, SPRO@CCS 2019, London, Uk, November 15, 2019., pp. 53-63, 2019, ACM, 978-1-4503-6835-3. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
13 | Pierrick Brunet, Béatrice Creusillet, Adrien Guinet, Juan Manuel Martinez Caamaño |
Epona and the Obfuscation Paradox: Transparent for Users and Developers, a Pain for Reversers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SPRO@CCS ![In: Proceedings of the 3rd ACM Workshop on Software Protection, SPRO@CCS 2019, London, Uk, November 15, 2019., pp. 41-52, 2019, ACM, 978-1-4503-6835-3. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
13 | Kenny Zhuo Ming Lu |
Control flow obfuscation via CPS transformation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PEPM@POPL ![In: Proceedings of the 2019 ACM SIGPLAN Workshop on Partial Evaluation and Program Manipulation, PEPM@POPL 2019, Cascais, Portugal, January 14-15, 2019, pp. 54-60, 2019, ACM, 978-1-4503-6226-9. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
13 | William L. Croft, Jörg-Rüdiger Sack, Wei Shi 0001 |
Differentially Private Obfuscation of Facial Images. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CD-MAKE ![In: Machine Learning and Knowledge Extraction - Third IFIP TC 5, TC 12, WG 8.4, WG 8.9, WG 12.9 International Cross-Domain Conference, CD-MAKE 2019, Canterbury, UK, August 26-29, 2019, Proceedings, pp. 229-249, 2019, Springer, 978-3-030-29725-1. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
13 | Mahabubul Alam, Yimin Ding, Xingjie Ni, Swaroop Ghosh |
Logic Obfuscation using Metasurface Holography. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MWSCAS ![In: 62nd IEEE International Midwest Symposium on Circuits and Systems, MWSCAS 2019, Dallas, TX, USA, August 4-7, 2019, pp. 460-463, 2019, IEEE, 978-1-7281-2788-0. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
13 | Michael Zuzak, Ankur Srivastava 0001 |
Memory Locking: An Automated Approach to Processor Design Obfuscation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISVLSI ![In: 2019 IEEE Computer Society Annual Symposium on VLSI, ISVLSI 2019, Miami, FL, USA, July 15-17, 2019, pp. 541-546, 2019, IEEE, 978-1-7281-3391-1. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
13 | Abhishek Chakraborty 0001, Ankur Srivastava 0001 |
Hardware-Software Co-Design Based Obfuscation of Hardware Accelerators. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISVLSI ![In: 2019 IEEE Computer Society Annual Symposium on VLSI, ISVLSI 2019, Miami, FL, USA, July 15-17, 2019, pp. 547-552, 2019, IEEE, 978-1-7281-3391-1. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
13 | Amin Rezaei 0001, Jie Gu 0001, Hi Zhou |
Hybrid Memristor-CMOS Obfuscation Against Untrusted Foundries. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISVLSI ![In: 2019 IEEE Computer Society Annual Symposium on VLSI, ISVLSI 2019, Miami, FL, USA, July 15-17, 2019, pp. 535-540, 2019, IEEE, 978-1-7281-3391-1. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
13 | Mahendra Rathor, Anirban Sengupta |
Enhanced Functional Obfuscation of DSP core using Flip-Flops and Combinational logic. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCE-Berlin ![In: 9th IEEE International Conference on Consumer Electronics, ICCE-Berlin 2019, Berlin, Germany, September 8-11, 2019, pp. 1-5, 2019, IEEE, 978-1-7281-2745-3. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
13 | Daniel Park, Haidar Khan, Bülent Yener |
Generation & Evaluation of Adversarial Examples for Malware Obfuscation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICMLA ![In: 18th IEEE International Conference On Machine Learning And Applications, ICMLA 2019, Boca Raton, FL, USA, December 16-19, 2019, pp. 1283-1290, 2019, IEEE, 978-1-7281-4550-1. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
13 | Xueyi Yang, Lingchen Zhang, Cunqing Ma, Zongbin Liu, Ping Peng |
Android Control Flow Obfuscation Based on Dynamic Entry Points Modification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSCS ![In: 22nd International Conference on Control Systems and Computer Science, CSCS 2019, Bucharest, Romania, May 28-30, 2019, pp. 296-303, 2019, IEEE, 978-1-7281-2331-8. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
13 | Mustafa M. Shihab, Jingxiang Tian, Gaurav Rajavendra Reddy, Bo Hu, William Swartz, Benjamin Carrión Schäfer, Carl Sechen, Yiorgos Makris |
Design Obfuscation through Selective Post-Fabrication Transistor-Level Programming. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DATE ![In: Design, Automation & Test in Europe Conference & Exhibition, DATE 2019, Florence, Italy, March 25-29, 2019, pp. 528-533, 2019, IEEE, 978-3-9819263-2-3. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|