Filters








47,232 Hits in 1.7 sec

Obfuscation Combiners [chapter]

Marc Fischlin, Amir Herzberg, Hod Bin-Noon, Haya Shulman
2016 Lecture Notes in Computer Science  
Namely, we show that one can build 3-out-of-4 obfuscation combiners where at least three of the four combiners are secure, whereas 2-out-of-3 structural combiners (which combine the obfuscator candidates  ...  To reduce overhead, we define detecting combiners, where the combined obfuscator may sometimes produce an error-indication instead of the desired output, indicating that some of the component obfuscators  ...  Combiners for Obfuscators Roughly, a combiner for obfuscators is a procedure which uses a set of obfuscators O 1 , O 2 , . . . to turn an input circuit C into an obfuscated one, with the guarantee that  ... 
doi:10.1007/978-3-662-53008-5_18 fatcat:wmyie72fi5c4hhl4opj6qsug6m

VirtSC

Mohsen Ahmadvand, Daniel Below, Sebastian Banescu, Alexander Pretschner
2019 Proceedings of the 3rd ACM Workshop on Software Protection - SPRO'19  
This means the expected hash values need to be adjusted in the binary executable, hence combining SC with other protections is limited due to this adjustment step.  ...  However, large overheads stemming from the virtualization obfuscation were encountered.  ...  CONCLUSIONS We designed, implemented and evaluated an LLVM-based protection that effectively combines virtualization obfuscation (VO) and self-checksumming (SC).  ... 
doi:10.1145/3338503.3357723 dblp:conf/ccs/AhmadvandBBP19 fatcat:l6olusxdgrfxdni25dvtz3wamq

Obfuscation of combination circuits of digital devices from unauthorized access

L. A. Zolotorevich
2019 Informatika  
The algorithm of logical obfuscation and coding of digital structures based on the use of methods and means of test diagnostics is proposed.  ...  Obfuscation of combination circuits of digital devices from unauthorized access. Informatics, 2019, vol. 16, no. 3, pp. 89-100 (in Russian).  ...  The algorithm of logical obfuscation and coding of digital structures based on the use of methods and means of test diagnostics is proposed. Введение.  ... 
doaj:d59b1e36324d4e77915474dd0666e0c6 fatcat:mkxoazijrnaohm3dgjxutrkc24

Robust Transforming Combiners from Indistinguishability Obfuscation to Functional Encryption [chapter]

Prabhanjan Ananth, Aayush Jain, Amit Sahai
2017 Lecture Notes in Computer Science  
We present transforming combiners from indistinguishability obfuscation to functional encryption and non-interactive multiparty key exchance (NIKE).  ...  We call such combiners transforming combiners.  ...  This follows from the security of onion obfuscation combiner.  ... 
doi:10.1007/978-3-319-56620-7_4 fatcat:c3oa3rsfhbgbpohb6ueawxse4u

Universal Constructions and Robust Combiners for Indistinguishability Obfuscation and Witness Encryption [chapter]

Prabhanjan Ananth, Aayush Jain, Moni Naor, Amit Sahai, Eylon Yogev
2016 Lecture Notes in Computer Science  
Combiners are especially important for a primitive where there are several competing constructions whose security is hard to evaluate, as is the case for indistinguishability obfuscation (IO) and witness  ...  In a recent paper, Goldwasser and Kalai posed as a challenge finding universal constructions for indistinguishability obfuscation and witness encryption.  ...  Acknowledgements We thank Yuval Ishai for helpful discussions and for bringing to our notice the problem of universal obfuscation.  ... 
doi:10.1007/978-3-662-53008-5_17 fatcat:hodmwzkxl5g47esxgmjuipxzza

Implementation of White-Box Cryptography in Credit Card Processing Combined with Code Obfuscation

Nilima Yadav, Sarvesh Tanwar
2013 International Journal of Computer Applications  
Combination of these two concepts gives a new level in modern cryptography as well as optimizes its performance and additionally we will make end points (Client and server) secure.  ...  Another technique such as obfuscation is mainly designed to facilitate securing of e-commerce and ebanking applications, which often embed cryptographic keys and critical information.  ...  Another section shows the comparison between two different combinations of algorithms (AES-128/256, RSA and SHA-1/2) which solve the problem of key extraction.  ... 
doi:10.5120/11938-7728 fatcat:p3cwv4ammveh3kdxrqdsna4oma

On the evaluation of android malware detectors against code-obfuscation techniques

Umair Nawaz, Muhammad Aleem, Jerry Chun-Wei Lin
2022 PeerJ Computer Science  
However, in most of the related works, the obfuscation techniques used for analysis are either based on individual or a combination of primitive obfuscation techniques.  ...  Therefore, it is crucial to analyze the impact of the different obfuscation techniques, both when they are used in isolation and when they are combined as hybrid techniques.  ...  when the obfuscation techniques are combined inter categories.  ... 
doi:10.7717/peerj-cs.1002 fatcat:fqx55jfzabdcnhk5apuzd63r7y

On the Evaluation of Android Malware Detectors

2018 Sukkur IBA Journal of Computing and Mathematical Sciences  
In this research paper, it has been demonstrated that the most of the known commercial malware detectors cannot detect common code obfuscation techniques.  ...  -Each level consists of different combinations of code obfuscation techniques.  ...  In the fourth step, obfuscation is applied to the decompiled code. To obfuscate the code, we employ the six obfuscation techniques and their combinations.  ... 
doi:10.30537/sjcms.v2i1.78 fatcat:6k4pxkzwtjhlbkplnnnqrrtgxq

Mode-based Obfuscation using Control-Flow Modifications

Sandhya Koteshwara, Chris H. Kim, Keshab K. Parhi
2016 Proceedings of the Third Workshop on Cryptography and Security in Computing Systems - CS2 '16  
from correct control signal combination is used. • Examples: 1.  ...  controlpath is built using different combinations of correct and incorrect control sequences, selected using multiplexers.  ...  Analysis of Obfuscated Modes Obscurity of control-flow : • For C different control signals in the design, each is obfuscated to degree L using a L:1 mux.  ... 
doi:10.1145/2858930.2858934 dblp:conf/hipeac/KoteshwaraKP16 fatcat:6w4ex5j7sjd2zmni7xns5px3vq

Analysis of Obfuscated Code with Program Slicing

Mahin Talukder, Syed Islam, Paolo Falcarin
2019 2019 International Conference on Cyber Security and Protection of Digital Services (Cyber Security)  
be removed by automated de-obfuscation tools.  ...  Obfuscation is a technique that is widely adopted by developers to mitigate this problem.  ...  Some of these combinations worked for some programs and not for others, thus we were able to generate 48 combinations that worked across the various programs; we generated 8 to 15 obfuscated versions for  ... 
doi:10.1109/cybersecpods.2019.8885094 dblp:conf/cybersecpods/TalukderIF19 fatcat:tisjl37c2ba4ra3o6fawfcv27q

Fine-Grained Static Detection of Obfuscation Transforms Using Ensemble-Learning and Semantic Reasoning [article]

Ramtine Tofighi-Shirazi, Philippe Elbaz-Vincent
2019 arXiv   pre-print
We present a novel approach that combines semantic reasoning techniques with ensemble learning classification for the purpose of providing a static detection framework for obfuscation transformations.  ...  According to our experimental results and evaluations on obfuscators such as Tigress and OLLVM, our models have up to 91% accuracy on state-of-the-art obfuscation transformations.  ...  Our evaluations are made with publicly available obfuscators, speci cally Tigress and OLLVM, in order to combine obfuscation transformations from di erent tools.  ... 
arXiv:1911.07523v1 fatcat:hzlwivh2nrdrdccuaweuit3n64

Fine-grained static detection of obfuscation transforms using ensemble-learning and semantic reasoning

Ramtine Tofighi-Shirazi, Irina Măriuca Asăvoae, Philippe Elbaz-Vincent
2019 Proceedings of the 9th Workshop on Software Security, Protection, and Reverse Engineering - SSPREW9 '19  
We present a novel approach that combines semantic reasoning techniques with ensemble learning classification for the purpose of providing a static detection framework for obfuscation transformations.  ...  According to our experimental results and evaluations on obfuscators such as Tigress and OLLVM, our models have up to 91% accuracy on state-of-the-art obfuscation transformations.  ...  Therefore, we do not combine obfuscation transformations for this study.  ... 
doi:10.1145/3371307.3371313 fatcat:x6d24qttkjh6hds5evndbc4awy

Stealth attacks: An extended insight into the obfuscation effects on Android malware

Davide Maiorca, Davide Ariu, Igino Corona, Marco Aresu, Giorgio Giacinto
2015 Computers & security  
In order to effectively evade anti-malware solutions, Android malware authors are progressively resorting to automatic obfuscation strategies.  ...  On one hand, the attained results show that anti-malware systems have improved their resilience against trivial obfuscation techniques.  ...  Combining Obfuscation Techniques The above techniques can be combined in order to make malware detection We used different combinations of the obfuscation techniques described in the previous sections.  ... 
doi:10.1016/j.cose.2015.02.007 fatcat:cdncs57vvngq5pmp7nw3qlmfli

A large study on the effect of code obfuscation on the quality of java code

Mariano Ceccato, Andrea Capiluppi, Paolo Falcarin, Cornelia Boldyreff
2014 Empirical Software Engineering  
Results: Results show that some of the considered obfuscations are effective in making code metrics change substantially from original to obfuscated code, although this change (called potency of the obfuscation  ...  Context: Obfuscation is a common technique used to protect software against malicious reverse engineering.  ...  In detail, each combined configurations is compared with the single obfuscations that participate in the combination.  ... 
doi:10.1007/s10664-014-9321-0 fatcat:yhobczotxvd3rnyftctrd557qi

A Girl Has A Name, And It's ... Adversarial Authorship Attribution for Deobfuscation [article]

Wanyue Zhai, Jonathan Rusert, Zubair Shafiq, Padmini Srinivasan
2022 arXiv   pre-print
However, existing authorship obfuscation approaches do not consider the adversarial threat model.  ...  Our results underline the need for stronger obfuscation approaches that are resistant to deobfuscation  ...  Since this is the combined condition, the defender may or may not use an obfuscator, and will choose from the two possible obfuscators to generate documents.  ... 
arXiv:2203.11849v1 fatcat:fdsfe6xfavcmjaxyaveme524h4
« Previous Showing results 1 — 15 out of 47,232 results