Filters








6,087 Hits in 4.4 sec

On the Complexity of Compressing Obfuscation [chapter]

Gilad Asharov, Naomi Ephraim, Ilan Komargodski, Rafael Pass
<span title="">2018</span> <i title="Springer International Publishing"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/2w3awgokqne6te4nvlofavy5a4" style="color: black;">Lecture Notes in Computer Science</a> </i> &nbsp;
In this work, we provide a systematic study of compressing obfuscation, one of the most natural and simple to describe primitives that is known to imply indistinguishability obfuscation when combined with  ...  A compressing obfuscator is roughly an indistinguishability obfuscator that outputs just a slightly compressed encoding of the truth table. This generalizes notions introduced by Lin et al.  ...  Acknowledgments We thank Zvika Brakerski for discussions about the possibility of SXiO and XiO with statistical security.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-319-96878-0_26">doi:10.1007/978-3-319-96878-0_26</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/pwdoxk4d2zaubgfd32qfunfbfm">fatcat:pwdoxk4d2zaubgfd32qfunfbfm</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20190216041237/http://pdfs.semanticscholar.org/0135/239106491a904355be1a0ea39d06747b7b77.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/01/35/0135239106491a904355be1a0ea39d06747b7b77.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-319-96878-0_26"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>

PowerDrive: Accurate De-Obfuscation and Analysis of PowerShell Malware [article]

Denis Ugarte, Davide Maiorca, Fabrizio Cara, Giorgio Giacinto
<span title="2019-04-24">2019</span> <i > arXiv </i> &nbsp; <span class="release-stage" >pre-print</span>
To the best of our knowledge, a comprehensive solution for properly de-obfuscating such attacks is currently missing.  ...  PowerDrive instruments the PowerShell code to progressively de-obfuscate it by showing the analyst the employed obfuscation steps.  ...  The projects are funded, respectively, by Sardegna Ricerche and Regione Autonoma della Sardegna.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/1904.10270v2">arXiv:1904.10270v2</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/itteqohyozbezejp3w2l52wxqa">fatcat:itteqohyozbezejp3w2l52wxqa</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20200828081532/https://arxiv.org/pdf/1904.10270v2.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/04/12/0412120e7a816e68c2429fab4e0ed922df2c084a.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/1904.10270v2" title="arxiv.org access"> <button class="ui compact blue labeled icon button serp-button"> <i class="file alternate outline icon"></i> arxiv.org </button> </a>

DeepObfuscation: Securing the Structure of Convolutional Neural Networks via Knowledge Distillation [article]

Hui Xu, Yuxin Su, Zirui Zhao, Yangfan Zhou, Michael R. Lyu, Irwin King
<span title="2018-06-27">2018</span> <i > arXiv </i> &nbsp; <span class="release-stage" >pre-print</span>
In particular, we focus on obfuscating convolutional neural networks (CNN), a widely employed type of deep learning architectures for image recognition.  ...  Our obfuscation approach is very effective to protect the critical structure of a deep learning model from being exposed to attackers.  ...  On one hand, we can lower the complexity of the target feature extractor to simulate. On the other hand, it examines whether a target model can be simulated with a shallow network.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/1806.10313v1">arXiv:1806.10313v1</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/juzxi4y27rhvvmdesie2zfnbwq">fatcat:juzxi4y27rhvvmdesie2zfnbwq</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20200825205239/https://arxiv.org/pdf/1806.10313v1.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/ea/62/ea6207e553a5c8a3e171a8f6b6297688ab43f92d.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/1806.10313v1" title="arxiv.org access"> <button class="ui compact blue labeled icon button serp-button"> <i class="file alternate outline icon"></i> arxiv.org </button> </a>

Feature Point Detection for Repacked Android Apps

M. A. Rahim Khan, Manoj Kumar Jain
<span title="">2020</span> <i title="Computers, Materials and Continua (Tech Science Press)"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/a6m5ovtnq5h6bb2dcb357moo4a" style="color: black;">Intelligent Automation and Soft Computing</a> </i> &nbsp;
Further, the proposed method is extended to detect obfuscation of malware attacks by detecting the packed executables, which is the initial step in obfuscation attack detection.  ...  Although the approach was efficient in detecting the repacked Android apps, it was not suitable for detecting obfuscation attacks. Additionally, the time complexity needed improvement.  ...  Funding Statement: The authors received no specific funding for this study. Conflicts of Interest: The authors declare that they have no conflicts of interest to report regarding the present study.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.32604/iasc.2020.013849">doi:10.32604/iasc.2020.013849</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/vvfegnljzzbp7bsn6u7ymubpra">fatcat:vvfegnljzzbp7bsn6u7ymubpra</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20220223065949/https://www.techscience.com/ueditor/files/TSP_IASC-26-6/TSP_IASC_13849/TSP_IASC_13849.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/62/2f/622f497e8184d6d68370969275b7da77d833ec2d.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.32604/iasc.2020.013849"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> Publisher / doi.org </button> </a>

Algorithmic Information Theory for Obfuscation Security

Rabih Mohsen, Alexandre Miranda Pinto
<span title="">2015</span> <i title="SCITEPRESS - Science and and Technology Publications"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/tucwymxjpnhgdnuki4g66gio5q" style="color: black;">Proceedings of the 12th International Conference on Security and Cryptography</a> </i> &nbsp;
In this paper, we undertake a theoretical investigation of code obfuscation security based on Kolmogorov complexity and algorithmic mutual information.  ...  State of the art obfuscation techniques rely on an unproven concept of security, and therefore are not regarded as provably secure.  ...  For example, it is still not clear whether the complexity of security parameter (key) has always a positive effect on the the security of obfuscated programs based on algorithmic mutual information definition  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.5220/0005548200760087">doi:10.5220/0005548200760087</a> <a target="_blank" rel="external noopener" href="https://dblp.org/rec/conf/secrypt/MohsenP15.html">dblp:conf/secrypt/MohsenP15</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/ipuwyhntiffx7hv7cjaap7pubi">fatcat:ipuwyhntiffx7hv7cjaap7pubi</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20151022134833/http://eprint.iacr.org/2015/793.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/6f/92/6f9250fb34a5b02b351e62e6cef85b0649c5ed85.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.5220/0005548200760087"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> Publisher / doi.org </button> </a>

FACE OBFUSCATION BASED REVERSIBLE WATERMARKING FOR TAMPER PROOF IRADICATION

Suhasini Andurey .
<span title="2015-05-25">2015</span> <i title="eSAT Publishing House"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/m4rdj3kwwfcbvfzkv6kcnagwtm" style="color: black;">International Journal of Research in Engineering and Technology</a> </i> &nbsp;
Several reversible watermarking methods have been proposed but one of the important challenge is to make the obfuscation process reversible so that the original image/video can be recovered by persons  ...  The residual information needed is compressed, authenticated, encrypted and embedded within the obfuscated image using a twolevel Reversible Watermarking scheme.  ...  The difference between the original and obfuscated image is compressed, authenticated, encrypted and embedded within the obfuscated image itself.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.15623/ijret.2015.0417021">doi:10.15623/ijret.2015.0417021</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/cdwipo2adzfw5dhecjngrys6bq">fatcat:cdwipo2adzfw5dhecjngrys6bq</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20200210154408/https://ijret.org/volumes/2015v04/i17/IJRET20150417021.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/61/74/6174dd92a367cc043896fa269e24fdb1bde93473.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.15623/ijret.2015.0417021"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> Publisher / doi.org </button> </a>

A Novel Reversible De-Identification Approach For Lossless Image Compression Based On Reversible Watermarking Mechanism Based On Obfuscation Process

Ghatamaneni Tejaswini
<span title="2016-08-20">2016</span> <i title="Valley International"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/7itxqhdltnewtn4ueymnlhnkea" style="color: black;">International Journal Of Engineering And Computer Science</a> </i> &nbsp;
One important challenge is to make the obfuscation process reversible so that the original image/video can be recovered by persons in possession of the right security credentials.  ...  The residual information needed to reverse the obfuscation process is compressed, authenticated, encrypted and embedded within the obfuscated image using a two-level Reversible Watermarking scheme.  ...  Future work will focus on the extension of this algorithm for lossy image and video compression standards. 1], develop a high capacity reversible data-embedding technique based on embedding message on  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.18535/ijecs/v4i10.33">doi:10.18535/ijecs/v4i10.33</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/wvy57wgqtveqnc5ncmrbfdida4">fatcat:wvy57wgqtveqnc5ncmrbfdida4</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20180602124456/http://ijecs.in/issue/v4-i10/33%20ijecs.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/3a/c5/3ac5b5fb072ca207677efd9217e4ed89dd256965.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.18535/ijecs/v4i10.33"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> Publisher / doi.org </button> </a>

A taxonomy of self-modifying code for obfuscation

Nikos Mavrogiannopoulos, Nessim Kisserli, Bart Preneel
<span title="">2011</span> <i title="Elsevier BV"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/e25s2ofdbnfb3j2rstrnkqsqfi" style="color: black;">Computers &amp; security</a> </i> &nbsp;
Self-modifying code is frequently used as an additional layer of complexity when obfuscating code.  ...  The core of the document, Section 3, defines code obfuscation, describes our classification methodology, and includes several real-world examples of obfuscation techniques using self-modifying code.  ...  /11/007), and by the IAP Programme P6/26 BCRYPT of the Belgian State (Belgian Science Policy).  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1016/j.cose.2011.08.007">doi:10.1016/j.cose.2011.08.007</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/xm55br2tqnacnah7tzsqnebtmi">fatcat:xm55br2tqnacnah7tzsqnebtmi</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20140207105359/http://www.cosic.esat.kuleuven.be:80/publications/article-1529.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/be/cb/becbb459368e2e004acda9f16951f23592fa4141.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1016/j.cose.2011.08.007"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> elsevier.com </button> </a>

Robust image obfuscation for privacy protection in Web 2.0 applications

Andreas Poller, Martin Steinebach, Huajian Liu, Nasir D. Memon, Adnan M. Alattar, Edward J. Delp III
<span title="2012-02-09">2012</span> <i title="SPIE"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/pkul4missbag5nli3onquc5dy4" style="color: black;">Media Watermarking, Security, and Forensics 2012</a> </i> &nbsp;
We present two approaches to robust image obfuscation based on permutation of image regions and channel intensity modulation.  ...  The obfuscation prevents particular malicious image processing like the extraction of  ...  a JPEG compressed obfuscated image with several quality factors; the part of the original, uncompressed image is shown left, (c) de-obfuscated image gained from a JPEG compressed (quality factor 80) and  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1117/12.908587">doi:10.1117/12.908587</a> <a target="_blank" rel="external noopener" href="https://dblp.org/rec/conf/mediaforensics/PollerSL12.html">dblp:conf/mediaforensics/PollerSL12</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/tc7flk6f3rdi3fhulbl22i5lga">fatcat:tc7flk6f3rdi3fhulbl22i5lga</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20130512042518/http://testlab.sit.fraunhofer.de/downloads/Publications/Poller_SPIE2012_Robust_Image_Obfuscation_for_Privacy_Protection.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/35/75/3575e6060855d5d592d429fc5af8c8e00be26e16.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1117/12.908587"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> Publisher / doi.org </button> </a>

ScanSAT: Unlocking Static and Dynamic Scan Obfuscation [article]

Lilas Alrahis, Muhammad Yasin, Nimisha Limaye, Hani Saleh, Baker Mohammad, Mahmoud Al-Qutayri, Ozgur Sinanoglu
<span title="2019-09-10">2019</span> <i > arXiv </i> &nbsp; <span class="release-stage" >pre-print</span>
Moreover, ScanSAT is effective even for large key sizes and in the presence of scan compression.  ...  While static scan obfuscation utilizes the same secret key, and thus, the same secret transformation functions throughout the lifetime of the chip, dynamic scan obfuscation updates the key periodically  ...  ScanSAT is based on the insight that the complex n-cycle transformation of scan locking can be modeled by generating a combinational (1-cycle transformation) equivalent of the scan-obfuscated circuit.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/1909.04428v1">arXiv:1909.04428v1</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/4j7fifgr65dj7lhdcrrcy5b6x4">fatcat:4j7fifgr65dj7lhdcrrcy5b6x4</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20200913073620/https://arxiv.org/pdf/1909.04428v1.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/1a/be/1abe0fbd16e5caf5abb900ee6209f7d9fe6e8ace.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/1909.04428v1" title="arxiv.org access"> <button class="ui compact blue labeled icon button serp-button"> <i class="file alternate outline icon"></i> arxiv.org </button> </a>

Reversible De-Identification for lossless image compression using Reversible Watermarking

Reuben A. Farrugia
<span title="">2014</span> <i title="IEEE"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/v3i5vkn5d5h3folxmo4lsxioxi" style="color: black;">2014 37th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO)</a> </i> &nbsp;
One important challenge is to make the obfuscation process reversible so that the original image/video can be recovered by persons in possession of the right security credentials.  ...  The residual information needed to reverse the obfuscation process is compressed, authenticated, encrypted and embedded within the obfuscated image using a two-level Reversible Watermarking scheme.  ...  Future work will focus on the extension of this algorithm for lossy image and video compression standards.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/mipro.2014.6859760">doi:10.1109/mipro.2014.6859760</a> <a target="_blank" rel="external noopener" href="https://dblp.org/rec/conf/mipro/Farrugia14.html">dblp:conf/mipro/Farrugia14</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/r6kn55sivzhnhnfmgcf3a7wq4i">fatcat:r6kn55sivzhnhnfmgcf3a7wq4i</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170809080357/http://www.kresttechnology.com/krest-academic-projects/krest-mtech-projects/ECE/DSP%20-%202014-15%20M.TECH%20base%20paper%20&amp;%20Abstact%20DSP/Base-Paper/%5B34%5D.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/2f/6b/2f6baf1fc904f92834880264d6e9569284ad6487.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/mipro.2014.6859760"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> ieee.com </button> </a>

Generic unpacking techniques

Komal Babar, Faiza Khalid
<span title="">2009</span> <i title="IEEE"> 2009 2nd International Conference on Computer, Control and Communication </i> &nbsp;
Obfuscation alters the byte sequence of the code without effectively changing the execution behavior. A commonly used obfuscation technique is packing.  ...  Modern malware authors can bypass signature-based scanning by employing the recently emerged technology of code obfuscation for information hiding.  ...  Obfuscation increases the complexity of a program to make reverse engineering harder. Three of the most important practical obfuscations are packing, code reordering, and junk insertion.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/ic4.2009.4909168">doi:10.1109/ic4.2009.4909168</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/gj3lgbjo5jaqrhffious7ma6hq">fatcat:gj3lgbjo5jaqrhffious7ma6hq</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170829020144/http://cfile28.uf.tistory.com/attach/1679C63350B3304D29DA18" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/8c/84/8c846d858a136a2a3bd0dc01c6e5d05d5d8017f4.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/ic4.2009.4909168"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> ieee.com </button> </a>

Exploit dynamic data flows to protect software against semantic attacks

Kaiyuan Kuang, Zhanyong Tang, Xiaoqing Gong, Dingyi Fang, Xiaojiang Chen, Heng Zhang, Jie Liu, Zheng Wang
<span title="">2017</span> <i title="IEEE"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/erx6l72aivetjct3ex7ervbqoq" style="color: black;">2017 IEEE SmartWorld, Ubiquitous Intelligence &amp; Computing, Advanced &amp; Trusted Computed, Scalable Computing &amp; Communications, Cloud &amp; Big Data Computing, Internet of People and Smart City Innovation (SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI)</a> </i> &nbsp;
These two techniques greatly increase the diversity of the program execution where the protected code regions exhibit a complex data flow across multiple runs, making it harder and more time consuming  ...  This paper presents DSA-VMP, a novel VM-based code obfuscation technique, to address the issue of semantic attacks.  ...  In the early years, the protection of the binary code mainly depends on some simple encryption and obfuscation methods, these methods can improve code complexity.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/uic-atc.2017.8397540">doi:10.1109/uic-atc.2017.8397540</a> <a target="_blank" rel="external noopener" href="https://dblp.org/rec/conf/uic/KuangTGFCZLW17.html">dblp:conf/uic/KuangTGFCZLW17</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/bkom6c6g7nbunb7nhm3yzfmywy">fatcat:bkom6c6g7nbunb7nhm3yzfmywy</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20200509093336/https://eprints.lancs.ac.uk/id/eprint/86306/1/UIC_2017_paper_80.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/1d/c4/1dc492c7fa8211d6cccbb830ddf0f8b432a3d973.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/uic-atc.2017.8397540"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> ieee.com </button> </a>

Turing Obfuscation [chapter]

Yan Wang, Shuai Wang, Pei Wang, Dinghao Wu
<span title="">2018</span> <i title="Springer International Publishing"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/jajl7qtqc5cy7oavratsldrv2y" style="color: black;">Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering</a> </i> &nbsp;
Complexity: the complicated structure of a Turing machine makes it difficult for attackers to understand the program control flow. 2).  ...  In addition, due to the runtime computation complexity of a Turing machine, program execution flow would be highly obfuscated and become resilient to advanced reverse engineering approaches via symbolic  ...  Potency weighs the complexity of the obfuscated programs, while resilience measures how well an obfuscated program can withstand automated deobfuscation techniques.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-319-78813-5_12">doi:10.1007/978-3-319-78813-5_12</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/7fxtf4pc2rcudmne7y7qj46p5y">fatcat:7fxtf4pc2rcudmne7y7qj46p5y</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20190306200406/http://pdfs.semanticscholar.org/d462/138ec20ba7140c74adc9eddbd09b3348a77f.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/d4/62/d462138ec20ba7140c74adc9eddbd09b3348a77f.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-319-78813-5_12"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>

Heuristic Authorship Obfuscation

Janek Bevendorff, Martin Potthast, Matthias Hagen, Benno Stein
<span title="">2019</span> <i title="Association for Computational Linguistics"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/5n6volmnonf5tn6xputi5f2t3e" style="color: black;">Proceedings of the 57th Annual Meeting of the Association for Computational Linguistics</a> </i> &nbsp;
Our authorship obfuscation approach defeats state-of-the-art verification approaches, including unmasking and compression models, while keeping text changes at a minimum. 1 Up to 10,000 text variants per  ...  To obfuscate, we explore the huge space of textual variants in order to find a paraphrased version of the to-be-obfuscated text that has a sufficient Jensen-Shannon distance at minimal costs in terms of  ...  This strong effect can be explained as follows: Sculley and Brodley describe their metrics in terms of the Kolmogorov complexity, but the reason why natural language allows for very good compression ratios  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.18653/v1/p19-1104">doi:10.18653/v1/p19-1104</a> <a target="_blank" rel="external noopener" href="https://dblp.org/rec/conf/acl/BevendorffPHS19.html">dblp:conf/acl/BevendorffPHS19</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/mdaxgg4bxvg25hgz7f23t7wczq">fatcat:mdaxgg4bxvg25hgz7f23t7wczq</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20200508194603/https://www.aclweb.org/anthology/P19-1104.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/7c/c2/7cc217b7338974ff69315a56667e9bdc051f139a.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.18653/v1/p19-1104"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> Publisher / doi.org </button> </a>
&laquo; Previous Showing results 1 &mdash; 15 out of 6,087 results