A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2019; you can also visit the original URL.
The file type is application/pdf
.
Filters
Obfuscation Combiners
[chapter]
2016
Lecture Notes in Computer Science
Namely, we show that one can build 3-out-of-4 obfuscation combiners where at least three of the four combiners are secure, whereas 2-out-of-3 structural combiners (which combine the obfuscator candidates ...
To reduce overhead, we define detecting combiners, where the combined obfuscator may sometimes produce an error-indication instead of the desired output, indicating that some of the component obfuscators ...
Combiners for Obfuscators Roughly, a combiner for obfuscators is a procedure which uses a set of obfuscators O 1 , O 2 , . . . to turn an input circuit C into an obfuscated one, with the guarantee that ...
doi:10.1007/978-3-662-53008-5_18
fatcat:wmyie72fi5c4hhl4opj6qsug6m
This means the expected hash values need to be adjusted in the binary executable, hence combining SC with other protections is limited due to this adjustment step. ...
However, large overheads stemming from the virtualization obfuscation were encountered. ...
CONCLUSIONS We designed, implemented and evaluated an LLVM-based protection that effectively combines virtualization obfuscation (VO) and self-checksumming (SC). ...
doi:10.1145/3338503.3357723
dblp:conf/ccs/AhmadvandBBP19
fatcat:l6olusxdgrfxdni25dvtz3wamq
Obfuscation of combination circuits of digital devices from unauthorized access
2019
Informatika
The algorithm of logical obfuscation and coding of digital structures based on the use of methods and means of test diagnostics is proposed. ...
Obfuscation of combination circuits of digital devices from unauthorized access. Informatics, 2019, vol. 16, no. 3, pp. 89-100 (in Russian). ...
The algorithm of logical obfuscation and coding of digital structures based on the use of methods and means of test diagnostics is proposed. Введение. ...
doaj:d59b1e36324d4e77915474dd0666e0c6
fatcat:mkxoazijrnaohm3dgjxutrkc24
Robust Transforming Combiners from Indistinguishability Obfuscation to Functional Encryption
[chapter]
2017
Lecture Notes in Computer Science
We present transforming combiners from indistinguishability obfuscation to functional encryption and non-interactive multiparty key exchance (NIKE). ...
We call such combiners transforming combiners. ...
This follows from the security of onion obfuscation combiner. ...
doi:10.1007/978-3-319-56620-7_4
fatcat:c3oa3rsfhbgbpohb6ueawxse4u
Universal Constructions and Robust Combiners for Indistinguishability Obfuscation and Witness Encryption
[chapter]
2016
Lecture Notes in Computer Science
Combiners are especially important for a primitive where there are several competing constructions whose security is hard to evaluate, as is the case for indistinguishability obfuscation (IO) and witness ...
In a recent paper, Goldwasser and Kalai posed as a challenge finding universal constructions for indistinguishability obfuscation and witness encryption. ...
Acknowledgements We thank Yuval Ishai for helpful discussions and for bringing to our notice the problem of universal obfuscation. ...
doi:10.1007/978-3-662-53008-5_17
fatcat:hodmwzkxl5g47esxgmjuipxzza
Implementation of White-Box Cryptography in Credit Card Processing Combined with Code Obfuscation
2013
International Journal of Computer Applications
Combination of these two concepts gives a new level in modern cryptography as well as optimizes its performance and additionally we will make end points (Client and server) secure. ...
Another technique such as obfuscation is mainly designed to facilitate securing of e-commerce and ebanking applications, which often embed cryptographic keys and critical information. ...
Another section shows the comparison between two different combinations of algorithms (AES-128/256, RSA and SHA-1/2) which solve the problem of key extraction. ...
doi:10.5120/11938-7728
fatcat:p3cwv4ammveh3kdxrqdsna4oma
On the evaluation of android malware detectors against code-obfuscation techniques
2022
PeerJ Computer Science
However, in most of the related works, the obfuscation techniques used for analysis are either based on individual or a combination of primitive obfuscation techniques. ...
Therefore, it is crucial to analyze the impact of the different obfuscation techniques, both when they are used in isolation and when they are combined as hybrid techniques. ...
when the obfuscation techniques are combined inter categories. ...
doi:10.7717/peerj-cs.1002
fatcat:fqx55jfzabdcnhk5apuzd63r7y
On the Evaluation of Android Malware Detectors
2018
Sukkur IBA Journal of Computing and Mathematical Sciences
In this research paper, it has been demonstrated that the most of the known commercial malware detectors cannot detect common code obfuscation techniques. ...
-Each level consists of different combinations of code obfuscation techniques. ...
In the fourth step, obfuscation is applied to the decompiled code. To obfuscate the code, we employ the six obfuscation techniques and their combinations. ...
doi:10.30537/sjcms.v2i1.78
fatcat:6k4pxkzwtjhlbkplnnnqrrtgxq
Mode-based Obfuscation using Control-Flow Modifications
2016
Proceedings of the Third Workshop on Cryptography and Security in Computing Systems - CS2 '16
from correct control signal combination is used. • Examples: 1. ...
controlpath is built using different combinations of correct and incorrect control sequences, selected using multiplexers. ...
Analysis of Obfuscated Modes Obscurity of control-flow : • For C different control signals in the design, each is obfuscated to degree L using a L:1 mux. ...
doi:10.1145/2858930.2858934
dblp:conf/hipeac/KoteshwaraKP16
fatcat:6w4ex5j7sjd2zmni7xns5px3vq
Analysis of Obfuscated Code with Program Slicing
2019
2019 International Conference on Cyber Security and Protection of Digital Services (Cyber Security)
be removed by automated de-obfuscation tools. ...
Obfuscation is a technique that is widely adopted by developers to mitigate this problem. ...
Some of these combinations worked for some programs and not for others, thus we were able to generate 48 combinations that worked across the various programs; we generated 8 to 15 obfuscated versions for ...
doi:10.1109/cybersecpods.2019.8885094
dblp:conf/cybersecpods/TalukderIF19
fatcat:tisjl37c2ba4ra3o6fawfcv27q
Fine-Grained Static Detection of Obfuscation Transforms Using Ensemble-Learning and Semantic Reasoning
[article]
2019
arXiv
pre-print
We present a novel approach that combines semantic reasoning techniques with ensemble learning classification for the purpose of providing a static detection framework for obfuscation transformations. ...
According to our experimental results and evaluations on obfuscators such as Tigress and OLLVM, our models have up to 91% accuracy on state-of-the-art obfuscation transformations. ...
Our evaluations are made with publicly available obfuscators, speci cally Tigress and OLLVM, in order to combine obfuscation transformations from di erent tools. ...
arXiv:1911.07523v1
fatcat:hzlwivh2nrdrdccuaweuit3n64
Fine-grained static detection of obfuscation transforms using ensemble-learning and semantic reasoning
2019
Proceedings of the 9th Workshop on Software Security, Protection, and Reverse Engineering - SSPREW9 '19
We present a novel approach that combines semantic reasoning techniques with ensemble learning classification for the purpose of providing a static detection framework for obfuscation transformations. ...
According to our experimental results and evaluations on obfuscators such as Tigress and OLLVM, our models have up to 91% accuracy on state-of-the-art obfuscation transformations. ...
Therefore, we do not combine obfuscation transformations for this study. ...
doi:10.1145/3371307.3371313
fatcat:x6d24qttkjh6hds5evndbc4awy
Stealth attacks: An extended insight into the obfuscation effects on Android malware
2015
Computers & security
In order to effectively evade anti-malware solutions, Android malware authors are progressively resorting to automatic obfuscation strategies. ...
On one hand, the attained results show that anti-malware systems have improved their resilience against trivial obfuscation techniques. ...
Combining Obfuscation Techniques The above techniques can be combined in order to make malware detection We used different combinations of the obfuscation techniques described in the previous sections. ...
doi:10.1016/j.cose.2015.02.007
fatcat:cdncs57vvngq5pmp7nw3qlmfli
A large study on the effect of code obfuscation on the quality of java code
2014
Empirical Software Engineering
Results: Results show that some of the considered obfuscations are effective in making code metrics change substantially from original to obfuscated code, although this change (called potency of the obfuscation ...
Context: Obfuscation is a common technique used to protect software against malicious reverse engineering. ...
In detail, each combined configurations is compared with the single obfuscations that participate in the combination. ...
doi:10.1007/s10664-014-9321-0
fatcat:yhobczotxvd3rnyftctrd557qi
A Girl Has A Name, And It's ... Adversarial Authorship Attribution for Deobfuscation
[article]
2022
arXiv
pre-print
However, existing authorship obfuscation approaches do not consider the adversarial threat model. ...
Our results underline the need for stronger obfuscation approaches that are resistant to deobfuscation ...
Since this is the combined condition, the defender may or may not use an obfuscator, and will choose from the two possible obfuscators to generate documents. ...
arXiv:2203.11849v1
fatcat:fdsfe6xfavcmjaxyaveme524h4
« Previous
Showing results 1 — 15 out of 47,232 results