|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 385 occurrences of 212 keywords
|
|
|
Results
Found 1965 publication records. Showing 1965 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
13 | Hannah Badier, Jean-Christophe Le Lann, Philippe Coussy, Guy Gogniat |
Transient Key-based Obfuscation for HLS in an Untrusted Cloud Environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DATE ![In: Design, Automation & Test in Europe Conference & Exhibition, DATE 2019, Florence, Italy, March 25-29, 2019, pp. 1118-1123, 2019, IEEE, 978-3-9819263-2-3. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
13 | Yilei Chen 0001, Minki Hhan, Vinod Vaikuntanathan, Hoeteck Wee |
Matrix PRFs: Constructions, Attacks, and Applications to Obfuscation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TCC (1) ![In: Theory of Cryptography - 17th International Conference, TCC 2019, Nuremberg, Germany, December 1-5, 2019, Proceedings, Part I, pp. 55-80, 2019, Springer, 978-3-030-36029-0. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
13 | Giovanni Di Crescenzo, Abhrajit Sengupta, Ozgur Sinanoglu, Muhammad Yasin |
Logic Locking of Boolean Circuits: Provable Hardware-Based Obfuscation from a Tamper-Proof Memory. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SECITC ![In: Innovative Security Solutions for Information Technology and Communications - 12th International Conference, SecITC 2019, Bucharest, Romania, November 14-15, 2019, Revised Selected Papers, pp. 172-192, 2019, Springer, 978-3-030-41024-7. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
13 | Fei Xiang, Daofu Gong, Chunfang Yang, Fenlin Liu |
Enhanced branch obfuscation based on exception handling and encrypted mapping table. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM TUR-C ![In: Proceedings of the ACM Turing Celebration Conference - China, ACM TUR-C 2019, Chengdu, China, May 17-19, 2019., pp. 140:1-140:9, 2019, ACM, 978-1-4503-7158-2. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
13 | Carina Wiesen, Nils Albartus, Max Hoffmann 0001, Steffen Becker 0003, Sebastian Wallat, Marc Fyrbiak, Nikol Rummel, Christof Paar |
Towards cognitive obfuscation: impeding hardware reverse engineering based on psychological insights. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASP-DAC ![In: Proceedings of the 24th Asia and South Pacific Design Automation Conference, ASPDAC 2019, Tokyo, Japan, January 21-24, 2019, pp. 104-111, 2019, ACM, 978-1-4503-6007-4. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
13 | Johannes Feichtner, Christof Rabensteiner |
Obfuscation-Resilient Code Recognition in Android Apps. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the 14th International Conference on Availability, Reliability and Security, ARES 2019, Canterbury, UK, August 26-29, 2019., pp. 8:1-8:10, 2019, ACM, 978-1-4503-7164-3. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
13 | Davide Pizzolotto, Roberto Fellin, Mariano Ceccato |
OBLIVE: Seamless Code Obfuscation for Java Programs and Android Apps. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SANER ![In: 26th IEEE International Conference on Software Analysis, Evolution and Reengineering, SANER 2019, Hangzhou, China, February 24-27, 2019, pp. 629-633, 2019, IEEE, 978-1-7281-0591-8. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
13 | Yuting Zhu, Liyong Lin, Rong Su 0001 |
Supervisor Obfuscation Against Actuator Enablement Attack. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ECC ![In: 17th European Control Conference, ECC 2019, Naples, Italy, June 25-28, 2019, pp. 1760-1765, 2019, IEEE, 978-3-907144-00-8. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
13 | Serhii Semenov, Denys Voloshyn, Viacheslav Davydov |
Data Protection Method of an Unmanned Aerial Vehicle based on Obfuscation Procedure. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CybHyg ![In: Proceedings of the International Workshop on Cyber Hygiene (CybHyg-2019) co-located with 1st International Conference on Cyber Hygiene and Conflict Management in Global Information Networks (CyberConf 2019), Kyiv, Ukraine, November 30, 2019., pp. 515-525, 2019, CEUR-WS.org. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP BibTeX RDF |
|
13 | Xiaoyang Cheng, Yan Lin 0003, Debin Gao, Chunfu Jia |
DynOpVm: VM-Based Software Obfuscation with Dynamic Opcode Mapping. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACNS ![In: Applied Cryptography and Network Security - 17th International Conference, ACNS 2019, Bogota, Colombia, June 5-7, 2019, Proceedings, pp. 155-174, 2019, Springer, 978-3-030-21567-5. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
13 | Jithin Pavithran, Milan Patnaik, Chester Rebeiro |
D-TIME: Distributed Threadless Independent Malware Execution for Runtime Obfuscation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WOOT @ USENIX Security Symposium ![In: 13th USENIX Workshop on Offensive Technologies, WOOT 2019, Santa Clara, CA, USA, August 12-13, 2019., 2019, USENIX Association. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP BibTeX RDF |
|
13 | Korosh Vatanparvar, Viswam Nathan, Ebrahim Nemati, Md. Mahbubur Rahman, Jilong Kuang |
A Generative Model for Speech Segmentation and Obfuscation for Remote Health Monitoring. ![Search on Bibsonomy](Pics/bibsonomy.png) |
BSN ![In: 16th IEEE International Conference on Wearable and Implantable Body Sensor Networks, BSN 2019, Chicago, IL, USA, May 19-22, 2019, pp. 1-4, 2019, IEEE, 978-1-5386-7477-2. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
13 | Adil Ahmad, Byunggill Joe, Yuan Xiao 0001, Yinqian Zhang, Insik Shin, Byoungyoung Lee |
OBFUSCURO: A Commodity Obfuscation Engine on Intel SGX. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NDSS ![In: 26th Annual Network and Distributed System Security Symposium, NDSS 2019, San Diego, California, USA, February 24-27, 2019, 2019, The Internet Society, 1-891562-55-X. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP BibTeX RDF |
|
13 | Ce Pang, Chenxi Qiu, Ning Wang 0018 |
A Geo-Obfuscation Approach to Protect Worker Location Privacy in Spatial Crowdsourcing Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MASS Workshops ![In: 16th IEEE International Conference on Mobile Ad Hoc and Sensor Systems Workshops, MASS Workshops 2019, Monterey, CA, USA, November 4-7, 2019, pp. 166-167, 2019, IEEE, 978-1-7281-4121-3. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
13 | Jingsong Cui, Zhiqi Song, Qin Liu 0003, Hang Tu, Tianyu Wang |
A Generalized Obfuscation Method to Protect Software of Mobile Apps. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MSN ![In: 15th International Conference on Mobile Ad-Hoc and Sensor Networks, MSN 2019, Shenzhen, China, December 11-13, 2019, pp. 31-36, 2019, IEEE, 978-1-7281-5212-7. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
13 | Chandan Naik, M. Siddhartha, John Paul Martin, K. Chandrasekaran 0001 |
Location Privacy Using Data Obfuscation in Fog Computing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TENCON ![In: TENCON 2019 - 2019 IEEE Region 10 Conference (TENCON), Kochi, India, October 17-20, 2019, pp. 1286-1291, 2019, IEEE, 978-1-7281-1895-6. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
13 | Yanru Peng, Yuting Chen, Beijun Shen |
An Adaptive Approach to Recommending Obfuscation Rules for Java Bytecode Obfuscators. ![Search on Bibsonomy](Pics/bibsonomy.png) |
COMPSAC (1) ![In: 43rd IEEE Annual Computer Software and Applications Conference, COMPSAC 2019, Milwaukee, WI, USA, July 15-19, 2019, Volume 1, pp. 97-106, 2019, IEEE, 978-1-7281-2607-4. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
13 | Zhiqiang Li, Jun Sun, Qiben Yan, Witawas Srisa-an, Yutaka Tsutano |
Obfusifier: Obfuscation-Resistant Android Malware Detection System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SecureComm (1) ![In: Security and Privacy in Communication Networks - 15th EAI International Conference, SecureComm 2019, Orlando, FL, USA, October 23-25, 2019, Proceedings, Part I, pp. 214-234, 2019, Springer, 978-3-030-37227-9. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
13 | Dennis Hofheinz, Bogdan Ursu |
Dual-Mode NIZKs from Obfuscation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIACRYPT (1) ![In: Advances in Cryptology - ASIACRYPT 2019 - 25th International Conference on the Theory and Application of Cryptology and Information Security, Kobe, Japan, December 8-12, 2019, Proceedings, Part I, pp. 311-341, 2019, Springer, 978-3-030-34577-8. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
13 | Vivek V. Menon, Gaurav Kolhe, Andrew G. Schmidt, Joshua S. Monson, Matthew French, Yinghua Hu, Peter A. Beerel, Pierluigi Nuzzo 0002 |
System-Level Framework for Logic Obfuscation with Quantified Metrics for Evaluation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SecDev ![In: 2019 IEEE Cybersecurity Development, SecDev 2019, Tysons Corner, VA, USA, September 23-25, 2019, pp. 89-100, 2019, IEEE, 978-1-5386-7289-1. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
13 | Gaurav Kolhe, Hadi Mardani Kamali, Miklesh Naicker, Tyler David Sheaves, Hamid Mahmoodi, Sai Manoj P. D., Houman Homayoun, Setareh Rafatirad, Avesta Sasan |
Security and Complexity Analysis of LUT-based Obfuscation: From Blueprint to Reality. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCAD ![In: Proceedings of the International Conference on Computer-Aided Design, ICCAD 2019, Westminster, CO, USA, November 4-7, 2019, pp. 1-8, 2019, ACM, 9781728123509. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
13 | Kimia Zamiri Azar, Farnoud Farahmand, Hadi Mardani Kamali, Shervin Roshanisefat, Houman Homayoun, William Diehl, Kris Gaj, Avesta Sasan |
COMA: Communication and Obfuscation Management Architecture. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RAID ![In: 22nd International Symposium on Research in Attacks, Intrusions and Defenses, RAID 2019, Chaoyang District, Beijing, China, September 23-25, 2019., pp. 181-195, 2019, USENIX Association. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP BibTeX RDF |
|
13 | Yusuke Kawamoto 0001, Takao Murakami |
Local Distribution Obfuscation via Probability Coupling*. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Allerton ![In: 57th Annual Allerton Conference on Communication, Control, and Computing, Allerton 2019, Monticello, IL, USA, September 24-27, 2019, pp. 718-725, 2019, IEEE, 978-1-7281-3151-1. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
13 | Yongzhi Wang 0001, Yulong Shen, Cuicui Su, Ke Cheng, Yibo Yang, Anter Faree, Yao Liu 0007 |
CFHider: Control Flow Obfuscation with Intel SGX. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INFOCOM ![In: 2019 IEEE Conference on Computer Communications, INFOCOM 2019, Paris, France, April 29 - May 2, 2019, pp. 541-549, 2019, IEEE, 978-1-7281-0515-4. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
13 | Liyue Fan |
Practical Image Obfuscation with Provable Privacy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICME ![In: IEEE International Conference on Multimedia and Expo, ICME 2019, Shanghai, China, July 8-12, 2019, pp. 784-789, 2019, IEEE, 978-1-5386-9552-4. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
13 | Liyue Fan |
A Demonstration of Image Obfuscation with Provable Privacy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICME Workshops ![In: IEEE International Conference on Multimedia & Expo Workshops, ICME Workshops 2019, Shanghai, China, July 8-12, 2019, pp. 608, 2019, IEEE, 978-1-5386-9214-1. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
13 | Christopher Strucks, Manel Slokom, Martha A. Larson |
BlurM(or)e: Revisiting Gender Obfuscation in the User-Item Matrix. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RMSE@RecSys ![In: Proceedings of the Workshop on Recommendation in Multi-stakeholder Environments co-located with the 13th ACM Conference on Recommender Systems (RecSys 2019), Copenhagen, Denmark, September 20, 2019., 2019, CEUR-WS.org. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP BibTeX RDF |
|
13 | Toshiki Seto, Akito Monden, Zeynep Yücel, Yuichiro Kanzaki |
On Preventing Symbolic Execution Attacks by Low Cost Obfuscation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SNPD ![In: 20th IEEE/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing, SNPD 2019, Toyama, Japan, July 8-11, 2019, pp. 495-500, 2019, IEEE, 978-1-7281-1651-8. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
13 | Boaz Barak, Samuel B. Hopkins, Aayush Jain, Pravesh Kothari, Amit Sahai |
Sum-of-Squares Meets Program Obfuscation, Revisited. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT (1) ![In: Advances in Cryptology - EUROCRYPT 2019 - 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Darmstadt, Germany, May 19-23, 2019, Proceedings, Part I, pp. 226-250, 2019, Springer, 978-3-030-17652-5. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
13 | Shweta Agrawal |
Indistinguishability Obfuscation Without Multilinear Maps: New Methods for Bootstrapping and Instantiation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT (1) ![In: Advances in Cryptology - EUROCRYPT 2019 - 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Darmstadt, Germany, May 19-23, 2019, Proceedings, Part I, pp. 191-225, 2019, Springer, 978-3-030-17652-5. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
13 | Jiawei Wang, Yuejun Zhang, Pengjun Wang, Zhicun Luan, Xiaoyong Xue, Xiaoyang Zeng, Qiaoyan Yu |
An Orthogonal Algorithm for Key Management in Hardware Obfuscation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsianHOST ![In: Asian Hardware Oriented Security and Trust Symposium, AsianHOST 2019, Xi'an, China, December 16-17, 2019, pp. 1-4, 2019, IEEE, 978-1-7281-3544-1. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
13 | Denis Ugarte, Davide Maiorca, Fabrizio Cara, Giorgio Giacinto |
PowerDrive: Accurate De-obfuscation and Analysis of PowerShell Malware. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DIMVA ![In: Detection of Intrusions and Malware, and Vulnerability Assessment - 16th International Conference, DIMVA 2019, Gothenburg, Sweden, June 19-20, 2019, Proceedings, pp. 240-259, 2019, Springer, 978-3-030-22037-2. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
13 | Surbhi Chhabra, Kusum Lata |
Key-Based Obfuscation Using Strong Physical Unclonable Function: A Secure Implementation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HIS ![In: Hybrid Intelligent Systems - 19th International Conference on Hybrid Intelligent Systems (HIS 2019) held in Bhopal, India, December 10-12, 2019, pp. 398-408, 2019, Springer, 978-3-030-49335-6. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
13 | Xin Wang, Shimin Li, Rui Xue 0001 |
Cocks' Identity-Based Encryption in the Standard Model, via Obfuscation Techniques (Short Paper). ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWSEC ![In: Advances in Information and Computer Security - 14th International Workshop on Security, IWSEC 2019, Tokyo, Japan, August 28-30, 2019, Proceedings, pp. 273-283, 2019, Springer, 978-3-030-26833-6. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
13 | Ankur A Sharma, Xinmiao Zhang, Yingjie Lao |
Hardware Obfuscation Through Reconfiguration Finite Field Arithmetic Units. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCAS ![In: IEEE International Symposium on Circuits and Systems, ISCAS 2019, Sapporo, Japan, May 26-29, 2019, pp. 1-5, 2019, IEEE, 978-1-7281-0397-6. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
13 | Vaibhav Venugopal Rao, Ioannis Savidis |
Mesh Based Obfuscation of Analog Circuit Properties. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCAS ![In: IEEE International Symposium on Circuits and Systems, ISCAS 2019, Sapporo, Japan, May 26-29, 2019, pp. 1-5, 2019, IEEE, 978-1-7281-0397-6. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
13 | Xinmiao Zhang, Phillip Shvartsman, Jingbo Zhou, Eslam Yahya Tawfik |
Hardware Obfuscation of AES through Finite Field Construction Variation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCAS ![In: IEEE International Symposium on Circuits and Systems, ISCAS 2019, Sapporo, Japan, May 26-29, 2019, pp. 1-5, 2019, IEEE, 978-1-7281-0397-6. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
13 | Sandrine Blazy, Rémi Hutin |
Formal verification of a program obfuscation based on mixed Boolean-arithmetic expressions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CPP ![In: Proceedings of the 8th ACM SIGPLAN International Conference on Certified Programs and Proofs, CPP 2019, Cascais, Portugal, January 14-15, 2019, pp. 196-208, 2019, ACM, 978-1-4503-6222-1. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
13 | Bo Hu, Jingxiang Tian, Mustafa M. Shihab, Gaurav Rajavendra Reddy, William Swartz, Yiorgos Makris, Benjamin Carrión Schäfer, Carl Sechen |
Functional Obfuscation of Hardware Accelerators through Selective Partial Design Extraction onto an Embedded FPGA. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Great Lakes Symposium on VLSI ![In: Proceedings of the 2019 on Great Lakes Symposium on VLSI, GLSVLSI 2019, Tysons Corner, VA, USA, May 9-11, 2019, pp. 171-176, 2019, ACM, 978-1-4503-6252-8. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
13 | Gaurav Kolhe, Sai Manoj P. D., Setareh Rafatirad, Hamid Mahmoodi, Avesta Sasan, Houman Homayoun |
On Custom LUT-based Obfuscation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Great Lakes Symposium on VLSI ![In: Proceedings of the 2019 on Great Lakes Symposium on VLSI, GLSVLSI 2019, Tysons Corner, VA, USA, May 9-11, 2019, pp. 477-482, 2019, ACM, 978-1-4503-6252-8. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
13 | Yusuke Kawamoto 0001, Takao Murakami |
Local Obfuscation Mechanisms for Hiding Probability Distributions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS (1) ![In: Computer Security - ESORICS 2019 - 24th European Symposium on Research in Computer Security, Luxembourg, September 23-27, 2019, Proceedings, Part I, pp. 128-148, 2019, Springer, 978-3-030-29958-3. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
13 | Abdulrahman Alaql, Tamzidul Hoque, Domenic Forte, Swarup Bhunia |
Quality Obfuscation for Error-Tolerant and Adaptive Hardware IP Protection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
VTS ![In: 37th IEEE VLSI Test Symposium, VTS 2019, Monterey, CA, USA, April 23-25, 2019, pp. 1-6, 2019, IEEE, 978-1-7281-1170-4. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
13 | Steven H. H. Ding, Benjamin C. M. Fung, Philippe Charland |
Asm2Vec: Boosting Static Representation Robustness for Binary Clone Search against Code Obfuscation and Compiler Optimization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Symposium on Security and Privacy ![In: 2019 IEEE Symposium on Security and Privacy, SP 2019, San Francisco, CA, USA, May 19-23, 2019, pp. 472-489, 2019, IEEE, 978-1-5386-6660-9. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
13 | Muhammad Ikram 0001, Pierrick Beaume, Mohamed Ali Kâafar |
DaDiDroid: An Obfuscation Resilient Tool for Detecting Android Malware via Weighted Directed Call Graph Modelling. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICETE (2) ![In: Proceedings of the 16th International Joint Conference on e-Business and Telecommunications, ICETE 2019 - Volume 2: SECRYPT, Prague, Czech Republic, July 26-28, 2019., pp. 211-219, 2019, SciTePress, 978-989-758-378-0. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
13 | Jimmy Tekli, Bechara al Bouna, Raphaël Couturier, Gilbert Tekli, Zeinab al Zein, Marc Kamradt |
A Framework for Evaluating Image Obfuscation under Deep Learning-Assisted Privacy Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: 17th International Conference on Privacy, Security and Trust, PST 2019, Fredericton, NB, Canada, August 26-28, 2019, pp. 1-10, 2019, IEEE, 978-1-7281-3265-5. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
13 | Jing Yao, Helei Cui, Xiaolin Gui |
Secure Boolean Queries over Encrypted Data from Indistinguishability Obfuscation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DSC ![In: 2019 IEEE Conference on Dependable and Secure Computing, DSC 2019, Hangzhou, China, November 18-20, 2019, pp. 1-8, 2019, IEEE, 978-1-7281-2319-6. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
13 | Da Xiao, Shouying Bai, Qian Wu, Baojiang Cui |
Obfuscation Algorithms Based on Congruence Equation and Knapsack Problem. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EIDWT ![In: Advances in Internet, Data and Web Technologies, The 7th International Conference on Emerging Internet, Data and Web Technologies, EIDWT-2019s, Fujairah Campus, United Arab Emirates, 26-28 February 2019., pp. 128-136, 2019, Springer, 978-3-030-12838-8. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
13 | Prabhanjan Ananth, Aayush Jain, Huijia Lin, Christian Matt 0002, Amit Sahai |
Indistinguishability Obfuscation Without Multilinear Maps: New Paradigms via Low Degree Weak Pseudorandomness and Security Amplification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO (3) ![In: Advances in Cryptology - CRYPTO 2019 - 39th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2019, Proceedings, Part III, pp. 284-332, 2019, Springer, 978-3-030-26953-1. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
13 | Jung Hee Cheon, Wonhee Cho 0001, Minki Hhan, Jiseung Kim 0001, Changmin Lee 0001 |
Statistical Zeroizing Attack: Cryptanalysis of Candidates of BP Obfuscation over GGH15 Multilinear Map. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO (3) ![In: Advances in Cryptology - CRYPTO 2019 - 39th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2019, Proceedings, Part III, pp. 253-283, 2019, Springer, 978-3-030-26953-1. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
13 | Martín Bertrán, Natalia Martínez, Afroditi Papadaki, Qiang Qiu, Miguel R. D. Rodrigues, Galen Reeves, Guillermo Sapiro |
Adversarially Learned Representations for Information Obfuscation and Inference. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICML ![In: Proceedings of the 36th International Conference on Machine Learning, ICML 2019, 9-15 June 2019, Long Beach, California, USA, pp. 614-623, 2019, PMLR. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP BibTeX RDF |
|
13 | Ferdinando Fioretto, Terrence W. K. Mak, Pascal Van Hentenryck |
Privacy-Preserving Obfuscation of Critical Infrastructure Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IJCAI ![In: Proceedings of the Twenty-Eighth International Joint Conference on Artificial Intelligence, IJCAI 2019, Macao, China, August 10-16, 2019, pp. 1086-1092, 2019, ijcai.org. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
13 | Saurabh Gangurde, Binod Kumar 0001 |
A Unified Methodology for Hardware Obfuscation and IP Watermarking. ![Search on Bibsonomy](Pics/bibsonomy.png) |
VDAT ![In: VLSI Design and Test - 23rd International Symposium, VDAT 2019, Indore, India, July 4-6, 2019, Revised Selected Papers, pp. 258-271, 2019, Springer, 978-981-32-9766-1. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
13 | Daniele Jahier Pagliari, Sara Vinco, Enrico Macii, Massimo Poncino |
Low-Overhead Power Trace Obfuscation for Smart Meter Privacy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DAC ![In: Proceedings of the 56th Annual Design Automation Conference 2019, DAC 2019, Las Vegas, NV, USA, June 02-06, 2019, pp. 111, 2019, ACM, 978-1-4503-6725-7. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
13 | Rajit Karmakar, Suman Sekhar Jana, Santanu Chattopadhyay |
A Cellular Automata Guided Obfuscation Strategy For Finite-State-Machine Synthesis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DAC ![In: Proceedings of the 56th Annual Design Automation Conference 2019, DAC 2019, Las Vegas, NV, USA, June 02-06, 2019, pp. 90, 2019, ACM, 978-1-4503-6725-7. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
13 | Janek Bevendorff, Martin Potthast, Matthias Hagen, Benno Stein 0001 |
Heuristic Authorship Obfuscation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACL (1) ![In: Proceedings of the 57th Conference of the Association for Computational Linguistics, ACL 2019, Florence, Italy, July 28- August 2, 2019, Volume 1: Long Papers, pp. 1098-1108, 2019, Association for Computational Linguistics, 978-1-950737-48-2. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
13 | Ramtine Tofighi-Shirazi |
Analysis of obfuscation transformations on binary code. (Evaluation des méthodes d'obscurcissement de binaire). ![Search on Bibsonomy](Pics/bibsonomy.png) |
|
2019 |
RDF |
|
13 | Rahat Masood |
Online Privacy in Mobile and Web Platforms: Risk Quantification and Obfuscation Techniques. ![Search on Bibsonomy](Pics/bibsonomy.png) |
|
2019 |
RDF |
|
13 | Sebastian Banescu, Alexander Pretschner |
Chapter Five - A Tutorial on Software Obfuscation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Adv. Comput. ![In: Adv. Comput. 108, pp. 283-353, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
13 | Yuhei Kawakoya, Makoto Iwamura, Jun Miyoshi |
Taint-assisted IAT Reconstruction against Position Obfuscation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Inf. Process. ![In: J. Inf. Process. 26, pp. 813-824, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
13 | Chugui Xu, Ju Ren 0001, Deyu Zhang, Yaoxue Zhang |
Distilling at the Edge: A Local Differential Privacy Obfuscation Framework for IoT Data Analytics. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Commun. Mag. ![In: IEEE Commun. Mag. 56(8), pp. 20-25, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
13 | Xiaochuan Zhang, Jianmin Pang, Xiaonan Liu |
Common Program Similarity Metric Method for Anti-Obfuscation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Access ![In: IEEE Access 6, pp. 47557-47565, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
13 | Jung Hee Cheon, Minki Hhan, Jiseung Kim 0001, Changmin Lee 0001 |
Cryptanalysis on the HHSS Obfuscation Arising From Absence of Safeguards. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Access ![In: IEEE Access 6, pp. 40096-40104, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
13 | Amina Ahmed Nacer, Elio Goettelmann, Samir Youcef, Abdelkamel Tari, Claude Godart |
A Design-Time Semi-Automatic Approach for Obfuscating a Business Process Model in a Trusted Multi-Cloud Deployment: A Design-Time Approach for BP Obfuscation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Web Serv. Res. ![In: Int. J. Web Serv. Res. 15(4), pp. 61-81, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
13 | Domenic Forte, Yousef Iskander |
Guest Editorial: Hardware Reverse Engineering and Obfuscation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Hardw. Syst. Secur. ![In: J. Hardw. Syst. Secur. 2(4), pp. 287-288, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
13 | Sarah Amir, Bicky Shakya, Xiaolin Xu, Yier Jin, Swarup Bhunia, Mark M. Tehranipoor, Domenic Forte |
Development and Evaluation of Hardware Obfuscation Benchmarks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Hardw. Syst. Secur. ![In: J. Hardw. Syst. Secur. 2(2), pp. 142-161, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
13 | Gilad Asharov, Gil Segev 0001 |
On Constructing One-Way Permutations from Indistinguishability Obfuscation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Cryptol. ![In: J. Cryptol. 31(3), pp. 698-736, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
13 | Bahare Hashemzade, Ali Maroosi |
Hybrid Obfuscation Using Signals and Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Comput. Networks Commun. ![In: J. Comput. Networks Commun. 2018, pp. 6873807:1-6873807:6, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
13 | Thivya Kandappu, Archan Misra, Shih-Fen Cheng, Randy Tandriansyah, Hoong Chuin Lau |
Obfuscation At-Source: Privacy in Context-Aware Mobile Crowd-Sourcing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. ![In: Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 2(1), pp. 16:1-16:24, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
13 | Seong-je Cho, Kyeonghwan Lim, Jungkyu Han, Byoung-chir Kim, Minkyu Park, Sangchul Han |
Open-Source Android App Detection considering the Effects of Code Obfuscation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. ![In: J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 9(3), pp. 50-61, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
13 | Wynita M. Griggs, Giovanni Russo 0002, Robert Shorten |
Leader and Leaderless Multi-Layer Consensus With State Obfuscation: An Application to Distributed Speed Advisory Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Intell. Transp. Syst. ![In: IEEE Trans. Intell. Transp. Syst. 19(3), pp. 711-721, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
13 | Marc Fyrbiak, Simon Rokicki, Nicolai Bissantz, Russell Tessier, Christof Paar |
Hybrid Obfuscation to Protect Against Disclosure Attacks on Embedded Microprocessors. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Computers ![In: IEEE Trans. Computers 67(3), pp. 307-321, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
13 | Fabio Martinelli, Francesco Mercaldo, Vittoria Nardone, Antonella Santone, Arun Kumar Sangaiah, Aniello Cimitile |
Evaluating model checking for cyber threats code obfuscation identification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Parallel Distributed Comput. ![In: J. Parallel Distributed Comput. 119, pp. 203-218, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
13 | Xiaoxiao Wang 0001, Dongrong Zhang, Miao Tony He, Donglin Su, Mark M. Tehranipoor |
Secure Scan and Test Using Obfuscation Throughout Supply Chain. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. ![In: IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 37(9), pp. 1867-1880, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
13 | Jaya Dofe, Qiaoyan Yu |
Novel Dynamic State-Deflection Method for Gate-Level Design Obfuscation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. ![In: IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 37(2), pp. 273-285, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
13 | Nir Bitansky, Vinod Vaikuntanathan |
Indistinguishability Obfuscation from Functional Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. ACM ![In: J. ACM 65(6), pp. 39:1-39:37, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
13 | Craig Gentry, Charanjit S. Jutla |
Obfuscation using Tensor Products. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Electron. Colloquium Comput. Complex. ![In: Electron. Colloquium Comput. Complex. TR18, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP BibTeX RDF |
|
13 | Lixue Sun, Chunxiang Xu, Mingwu Zhang, Kefei Chen, Hongwei Li 0001 |
Secure searchable public key encryption against insider keyword guessing attacks from indistinguishability obfuscation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Sci. China Inf. Sci. ![In: Sci. China Inf. Sci. 61(3), pp. 038106:1-038106:3, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
13 | Anirban Sengupta, Saraju P. Mohanty, Fernando Pescador, Peter Corcoran 0001 |
Multi-Phase Obfuscation of Fault Secured DSP Designs With Enhanced Security Feature. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Consumer Electron. ![In: IEEE Trans. Consumer Electron. 64(3), pp. 356-364, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
13 | Dominik Wermke, Nicolas Huaman, Yasemin Acar, Bradley Reaves, Patrick Traynor, Sascha Fahl |
A Large Scale Investigation of Obfuscation Use in Google Play. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1801.02742, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP BibTeX RDF |
|
13 | Chris Emmery, Enrique Manjavacas, Grzegorz Chrupala |
Style Obfuscation by Invariance. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1805.07143, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP BibTeX RDF |
|
13 | Qianru Sun, Ayush Tewari, Weipeng Xu, Mario Fritz, Christian Theobalt, Bernt Schiele |
A Hybrid Model for Identity Obfuscation by Face Replacement. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1804.04779, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP BibTeX RDF |
|
13 | Mohammad Hashemi, Greg Cusack, Eric Keller |
Stochastic Substitute Training: A Gray-box Approach to Craft Adversarial Examples Against Gradient Obfuscation Defenses. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1810.10031, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP BibTeX RDF |
|
13 | Beatrice Perez, Mirco Musolesi, Gianluca Stringhini |
You are your Metadata: Identification and Obfuscation of Social Media Users using Metadata Information. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1803.10133, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP BibTeX RDF |
|
13 | Peter T. Breuer, Jonathan P. Bowen |
(Un)Encrypted Computing and Indistinguishability Obfuscation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1811.12365, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP BibTeX RDF |
|
13 | Jianlei Yang 0001, Xueyan Wang, Qiang Zhou 0001, Zhaohao Wang, Hai Li 0001, Yiran Chen 0001, Weisheng Zhao |
Exploiting Spin-Orbit Torque Devices as Reconfigurable Logic for Circuit Obfuscation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1802.02789, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP BibTeX RDF |
|
13 | Julien Duchêne, Eric Alata, Vincent Nicomette, Mohamed Kaâniche, Colas Le Guernic |
Specification-Based Protocol Obfuscation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1807.09464, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP BibTeX RDF |
|
13 | Tianwei Zhang 0004, Zecheng He, Ruby B. Lee |
Privacy-preserving Machine Learning through Data Obfuscation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1807.01860, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP BibTeX RDF |
|
13 | Yuting Zhu, Liyong Lin, Rong Su 0001 |
Supervisor Obfuscation Against Actuator Enablement Attack. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1811.02932, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP BibTeX RDF |
|
13 | Jiliang Zhang 0002, Lu Wan |
CMOS: Dynamic Multi-key Obfuscation Structure for Strong PUFs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1806.02011, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP BibTeX RDF |
|
13 | Shervin Roshanisefat, Harshith K. Thirumala, Kris Gaj, Houman Homayoun, Avesta Sasan |
Benchmarking the Capabilities and Limitations of SAT Solvers in Defeating Obfuscation Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1805.00054, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP BibTeX RDF |
|
13 | Michel A. Kinsy, Donato Kava, Alan Ehret, Miguel Mark |
Sphinx: A Secure Architecture Based on Binary Code Diversification and Execution Obfuscation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1802.04259, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP BibTeX RDF |
|
13 | Chien-Ying Chen, Monowar Hasan, AmirEmad Ghassami, Sibin Mohan, Negar Kiyavash |
REORDER: Securing Dynamic-Priority Real-Time Systems Using Schedule Obfuscation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1806.01393, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP BibTeX RDF |
|
13 | Hadi Mardani Kamali, Kimia Zamiri Azar, Kris Gaj, Houman Homayoun, Avesta Sasan |
LUT-Lock: A Novel LUT-based Logic Obfuscation for FPGA-Bitstream and ASIC-Hardware Protection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1804.11275, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP BibTeX RDF |
|
13 | Yusuke Kawamoto 0001, Takao Murakami |
Differentially Private Obfuscation Mechanisms for Hiding Probability Distributions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1812.00939, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP BibTeX RDF |
|
13 | Cunxi Yu, Daniel E. Holcomb |
Algorithmic Obfuscation over GF(2m). ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1809.06207, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP BibTeX RDF |
|
13 | Natasha Fernandes, Mark Dras, Annabelle McIver |
Author Obfuscation Using Generalised Differential Privacy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1805.08866, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP BibTeX RDF |
|
13 | Shuaike Dong, Menghao Li, Wenrui Diao, Xiangyu Liu, Jian Liu 0008, Zhou Li 0001, Fenghao Xu, Kai Chen 0012, Xiaofeng Wang 0006, Kehuan Zhang |
Understanding Android Obfuscation Techniques: A Large-Scale Investigation in the Wild. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1801.01633, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP BibTeX RDF |
|
13 | Prabuddha Chakraborty, Jonathan Cruz 0001, Swarup Bhunia |
SAIL: Machine Learning Guided Structural Analysis Attack on Hardware Obfuscation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1809.10743, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP BibTeX RDF |
|
13 | Fang-Hsiang Su, Jonathan Bell 0001, Gail E. Kaiser, Baishakhi Ray |
Obfuscation Resilient Search through Executable Classification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1806.02432, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP BibTeX RDF |
|
13 | Renuka Kumar, Anjana Mariam Kurian |
A Systematic Study on Static Control Flow Obfuscation Techniques in Java. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1809.11037, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP BibTeX RDF |
|
|
|