|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 88 occurrences of 76 keywords
|
|
|
Results
Found 67 publication records. Showing 67 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
51 | Praveen Sivadasan, P. Sojan Lal, Naveen Sivadasan |
JDATATRANS for array obfuscation in Java source codes to defeat reverse engineering from decompiled codes. |
Bangalore Compute Conf. |
2009 |
DBLP DOI BibTeX RDF |
restructured arrays, source code obfuscation, reverse engineering |
36 | Muhammad Raza Ali |
Why teach reverse engineering? |
ACM SIGSOFT Softw. Eng. Notes |
2005 |
DBLP DOI BibTeX RDF |
software evolution and maintenance, software reverse engineering, internet, software engineering, program understanding, reengineering, legacy systems, obfuscate, plagiarism |
34 | Shenoda Guirguis, Alok Pareek |
BronzeGate: real-time transactional data obfuscation for GoldenGate. |
EDBT |
2010 |
DBLP DOI BibTeX RDF |
data obfuscation, real-time transactional data management, security, privacy, usability, masking |
34 | Haibo Chen 0001, Liwei Yuan, Xi Wu 0001, Binyu Zang, Bo Huang 0002, Pen-Chung Yew |
Control flow obfuscation with information flow tracking. |
MICRO |
2009 |
DBLP DOI BibTeX RDF |
control flow obfuscation, opaque predicate, information flow tracking, control speculation |
34 | Xiangdong An 0001, Dawn N. Jutla, Nick Cercone |
Reasoning about obfuscated private information: who have lied and how to lie. |
WPES |
2006 |
DBLP DOI BibTeX RDF |
Bayesian networks, privacy protection, inference control, ubiquitous environments |
34 | Satoshi Hada |
Zero-Knowledge and Code Obfuscation. |
ASIACRYPT |
2000 |
DBLP DOI BibTeX RDF |
|
34 | Christian S. Collberg, Clark D. Thomborson, Douglas Low |
Breaking Abstractions and Unstructuring Data Structures. |
ICCL |
1998 |
DBLP DOI BibTeX RDF |
obfuscation, intellectual property protection, code transformations |
30 | Antigoni Polychroniadou, Gabriele Cipriani, Richard Hua, Tucker Balch |
Atlas-X Equity Financing: Unlocking New Methods to Securely Obfuscate Axe Inventory Data Based on Differential Privacy. |
IACR Cryptol. ePrint Arch. |
2024 |
DBLP BibTeX RDF |
|
30 | Antigoni Polychroniadou, Gabriele Cipriani, Richard Hua, Tucker Balch |
Atlas-X Equity Financing: Unlocking New Methods to Securely Obfuscate Axe Inventory Data Based on Differential Privacy. |
AAMAS |
2024 |
DBLP BibTeX RDF |
|
30 | Yanhui Chen, Yun Feng, Zhi Wang, Jianjun Zhao, Chengchun Wang, Qixu Liu |
IMaler: An Adversarial Attack Framework to Obfuscate Malware Structure Against DGCNN-Based Classifier via Reinforcement Learning. |
ICC |
2023 |
DBLP DOI BibTeX RDF |
|
30 | Ian McQuoid, Mike Rosulek, Jiayu Xu |
How to Obfuscate MPC Inputs. |
IACR Cryptol. ePrint Arch. |
2022 |
DBLP BibTeX RDF |
|
30 | Daniel Gibert, Matt Fredrikson, Carles Mateu, Jordi Planes, Quan Le |
Enhancing the insertion of NOP instructions to obfuscate malware via deep reinforcement learning. |
Comput. Secur. |
2022 |
DBLP DOI BibTeX RDF |
|
30 | Ian McQuoid, Mike Rosulek, Jiayu Xu |
How to Obfuscate MPC Inputs. |
TCC (2) |
2022 |
DBLP DOI BibTeX RDF |
|
30 | Bijan Shahbaz Nejad, Peter Roch, Marcus Handte, Pedro José Marrón |
Enhancing Privacy in Computer Vision Applications: An Emotion Preserving Approach to Obfuscate Faces. |
ISVC (2) |
2022 |
DBLP DOI BibTeX RDF |
|
30 | Daniel Gibert, Matt Fredrikson, Carles Mateu, Jordi Planes, Quan Le |
Enhancing the Insertion of NOP Instructions to Obfuscate Malware via Deep Reinforcement Learning. |
CoRR |
2021 |
DBLP BibTeX RDF |
|
30 | David Eberius, David Böhme, Olga Pearce |
Did the GPU obfuscate the load imbalance in my MPI simulation? |
HiPar@SC |
2021 |
DBLP DOI BibTeX RDF |
|
30 | Raghavendra Pradyumna Pothukuchi, Sweta Yamini Pothukuchi, Petros G. Voulgaris, Alexander G. Schwing, Josep Torrellas |
Maya: Using Formal Control to Obfuscate Power Side Channels. |
ISCA |
2021 |
DBLP DOI BibTeX RDF |
|
30 | Marcin Kardas, Marek Klonowski, Piotr Syga |
How to obfuscate execution of protocols in an ad hoc radio network? |
Ad Hoc Networks |
2019 |
DBLP DOI BibTeX RDF |
|
30 | Jia-Ning Luo, Ming-Hour Yang, Kuo-Yu Tsai |
A geographic map-based middleware framework to obfuscate smart vehicles' locations. |
Multim. Tools Appl. |
2019 |
DBLP DOI BibTeX RDF |
|
30 | Diego Esteves, Aniketh Janardhan Reddy, Piyush Chawla, Jens Lehmann 0001 |
Belittling the Source: Trustworthiness Indicators to Obfuscate Fake News on the Web. |
CoRR |
2018 |
DBLP BibTeX RDF |
|
30 | Xiaopeng Yang, Stanko Dimitrov |
Data envelopment analysis may obfuscate corporate financial data: using support vector machine and data envelopment analysis to predict corporate failure for nonmanufacturing firms. |
INFOR Inf. Syst. Oper. Res. |
2017 |
DBLP DOI BibTeX RDF |
|
30 | Dale Schinstock, Shane Smith, Warren N. White |
Does inexpensive hardware obfuscate simple experiments for control systems laboratories? |
ACC |
2017 |
DBLP DOI BibTeX RDF |
|
30 | Joe Zimmerman |
How to Obfuscate Programs Directly. |
EUROCRYPT (2) |
2015 |
DBLP DOI BibTeX RDF |
|
30 | Joe Zimmerman |
How to Obfuscate Programs Directly. |
IACR Cryptol. ePrint Arch. |
2014 |
DBLP BibTeX RDF |
|
30 | Justin L. Rice, Vir V. Phoha, Philip Robinson |
Using Mussel-Inspired Self-Organization and Account Proxies to Obfuscate Workload Ownership and Placement in Clouds. |
IEEE Trans. Inf. Forensics Secur. |
2013 |
DBLP DOI BibTeX RDF |
|
30 | Juan E. Tapiador, Julio C. Hernandez-Castro, Pedro Peris-Lopez |
Online Randomization Strategies to Obfuscate User Behavioral Patterns. |
J. Netw. Syst. Manag. |
2012 |
DBLP DOI BibTeX RDF |
|
30 | Edward Ferguson, Joseph Weber, Ragib Hasan |
Cloud Based Content Fetching: Using Cloud Infrastructure to Obfuscate Phishing Scam Analysis. |
SERVICES |
2012 |
DBLP DOI BibTeX RDF |
|
30 | Patrick LaRoche, Nur Zincir-Heywood, Malcolm I. Heywood |
Using Code Bloat to Obfuscate Evolved Network Traffic. |
EvoApplications (2) |
2010 |
DBLP DOI BibTeX RDF |
|
30 | William R. Cheswick |
Johnny Can Obfuscate: Beyond Mother's Maiden Name. |
HotSec |
2006 |
DBLP BibTeX RDF |
|
30 | William Zhu 0001, Clark D. Thomborson, Fei-Yue Wang 0001 |
Obfuscate arrays by homomorphic functions. |
GrC |
2006 |
DBLP DOI BibTeX RDF |
|
17 | Andrea Bianchi, Ian Oakley, Dong-Soo Kwon |
The secure haptic keypad: a tactile password system. |
CHI |
2010 |
DBLP DOI BibTeX RDF |
pin entry, tactile ui, security, user study |
17 | Karen Renaud, Joseph Maguire 0001 |
Armchair authentication. |
BCS HCI |
2009 |
DBLP BibTeX RDF |
graphical authentication mechanism, secluded space, context, shared space |
17 | Ken Layng |
Non-technical keys to keeping your personally identifiable information PII risk mitigation project on track. |
SIGUCCS |
2009 |
DBLP DOI BibTeX RDF |
PII, non-technical, management, efficiency, encryption, project, risks, strategy, sensitive, scanning, data, team, remediation, mitigate |
17 | Shucai Xiao, Jung-Min Park 0001, Yanzhu Ye |
Tamper Resistance for Software Defined Radio Software. |
COMPSAC (1) |
2009 |
DBLP DOI BibTeX RDF |
|
17 | Razvi Doomun, Thaier Hayajneh, Prashant Krishnamurthy, David Tipper |
SECLOUD: Source and Destination Seclusion Using Clouds for wireless ad hoc networks. |
ISCC |
2009 |
DBLP DOI BibTeX RDF |
|
17 | Kevin J. Hoffman, Patrick Eugster, Suresh Jagannathan |
Semantics-aware trace analysis. |
PLDI |
2009 |
DBLP DOI BibTeX RDF |
semantic tracing, trace views, tracing, testing tools, automated debugging, debugging aids |
17 | Stephen Drape, Irina Voiculescu |
Creating Transformations for Matrix Obfuscation. |
SAS |
2009 |
DBLP DOI BibTeX RDF |
Program Transformations, Information Hiding, Obfuscation, Matrix Operations |
17 | Kevin S. Bauer, Damon McCoy, Ben Greenstein, Dirk Grunwald, Douglas C. Sicker |
Performing traffic analysis on a wireless identifier-free link layer. |
Richard Tapia Celebration of Diversity in Computing Conference |
2009 |
DBLP DOI BibTeX RDF |
|
17 | Monirul Islam Sharif, Andrea Lanzi, Jonathon T. Giffin, Wenke Lee |
Automatic Reverse Engineering of Malware Emulators. |
SP |
2009 |
DBLP DOI BibTeX RDF |
|
17 | Christelle Braun, Konstantinos Chatzikokolakis 0001, Catuscia Palamidessi |
Compositional Methods for Information-Hiding. |
FoSSaCS |
2008 |
DBLP DOI BibTeX RDF |
|
17 | Christian Kästner, Sven Apel, Martin Kuhlemann |
Granularity in software product lines. |
ICSE |
2008 |
DBLP DOI BibTeX RDF |
feature refactoring, virtual separation of concerns, software product lines, ide |
17 | ZhangBing Zhou, Sami Bhiri, Manfred Hauswirth |
Control and data dependencies in business processes based on semantic business activities. |
iiWAS |
2008 |
DBLP DOI BibTeX RDF |
web service based business process, semantics, data dependency, control dependency, sequencing constraint |
17 | Diomidis Spinellis |
I Spy. |
IEEE Softw. |
2007 |
DBLP DOI BibTeX RDF |
performance, measurement, analysis, tracing, instrumentation |
17 | Romain Beauxis, Konstantinos Chatzikokolakis 0001, Catuscia Palamidessi, Prakash Panangaden |
Formal Approaches to Information-Hiding (Tutorial). |
TGC |
2007 |
DBLP DOI BibTeX RDF |
|
17 | Marcelo De Barros, Jing Shiau, Chen Shang, Kenton Gidewall, Hui Shi, Joe Forsmann |
Web Services Wind Tunnel: On Performance Testing Large-Scale Stateful Web Services. |
DSN |
2007 |
DBLP DOI BibTeX RDF |
|
17 | Bobby D. Birrer, Richard A. Raines, Rusty O. Baldwin, Barry E. Mullins, Robert W. Bennington |
Program Fragmentation as a Metamorphic Software Protection. |
IAS |
2007 |
DBLP DOI BibTeX RDF |
|
17 | Qinyi Wu, Calton Pu, Akhil Sahai, Roger S. Barga |
Categorization and Optimization of Synchronization Dependencies in Business Processes. |
ICDE |
2007 |
DBLP DOI BibTeX RDF |
|
17 | Ben Adida, Douglas Wikström |
How to Shuffle in Public. |
TCC |
2007 |
DBLP DOI BibTeX RDF |
|
17 | Karl Gyllstrom, Dorian Miller, P. David Stotts |
Techniques for improving the visibility and "sharability" of semi-transparent video in shared workspaces. |
ACM Southeast Regional Conference |
2007 |
DBLP DOI BibTeX RDF |
semi-transparency, collaboration, videoconferencing |
17 | Tao Jiang 0004, Helen J. Wang, Yih-Chun Hu |
Preserving location privacy in wireless lans. |
MobiSys |
2007 |
DBLP DOI BibTeX RDF |
privacy, localization, 802.11 |
17 | Di Lin, Paul Dunphy, Patrick Olivier, Jeff Yan |
Graphical passwords & qualitative spatial relations. |
SOUPS |
2007 |
DBLP DOI BibTeX RDF |
|
17 | James A. Jones, Mary Jean Harrold, James F. Bowring |
Debugging in Parallel. |
ISSTA |
2007 |
DBLP DOI BibTeX RDF |
execution clustering, empirical study, program analysis, fault localization, automated debugging |
17 | Pandurang Kamat, Wenyuan Xu 0001, Wade Trappe, Yanyong Zhang |
Temporal Privacy in Wireless Sensor Networks. |
ICDCS |
2007 |
DBLP DOI BibTeX RDF |
|
17 | Srikanth Palla, Ram Dantu |
Unwanted SMTP Paths and Relays. |
COMSWARE |
2007 |
DBLP DOI BibTeX RDF |
|
17 | Christophe Clavier |
Secret External Encodings Do Not Prevent Transient Fault Analysis. |
CHES |
2007 |
DBLP DOI BibTeX RDF |
Physical Attacks, Secret Algorithm, Cryptographic Design, External Encoding, Smart Cards, DES, Fault Analysis |
17 | Marios Iliofotou, Prashanth Pappu, Michalis Faloutsos, Michael Mitzenmacher, Sumeet Singh, George Varghese |
Network monitoring using traffic dispersion graphs (tdgs). |
Internet Measurement Conference |
2007 |
DBLP DOI BibTeX RDF |
behavioral approach, hosts' connection graphs, network traffic visualization, network monitoring |
17 | Xiangdong An 0001, Dawn N. Jutla, Nick Cercone |
Temporal Context Lie Detection and Generation. |
Secure Data Management |
2006 |
DBLP DOI BibTeX RDF |
pervasive computing, obfuscation, dynamic Bayesian networks, inference control, uncertain reasoning, Privacy management, context inference |
17 | Hilmi Günes Kayacik, Malcolm I. Heywood, Nur Zincir-Heywood |
On evolving buffer overflow attacks using genetic programming. |
GECCO |
2006 |
DBLP DOI BibTeX RDF |
intrusion detection systems, linear genetic programming, mimicry attacks |
17 | Abdulrahman Alarifi, Wenliang Du |
Diversify sensor nodes to improve resilience against node compromise. |
SASN |
2006 |
DBLP DOI BibTeX RDF |
wireless sensor networks, reverse engineering, diversity, obfuscation |
17 | Jürgen Nützel, Anja Beyer |
Towards Trust in Digital Rights Management Systems. |
TrustBus |
2006 |
DBLP DOI BibTeX RDF |
|
17 | Shafi Goldwasser, Yael Tauman Kalai |
On the Impossibility of Obfuscation with Auxiliary Input. |
FOCS |
2005 |
DBLP DOI BibTeX RDF |
|
17 | Jurgen J. Vinju |
Type-Driven Automatic Quotation of Concrete Object Code in Meta Programs. |
RISE |
2005 |
DBLP DOI BibTeX RDF |
|
17 | Michael Venable, Mohamed R. Chouchane, Md. Enamul Karim, Arun Lakhotia |
Analyzing Memory Accesses in Obfuscated x86 Executables. |
DIMVA |
2005 |
DBLP DOI BibTeX RDF |
|
17 | Serge Demeyer |
Refactor Conditionals into Polymorphism: What's the Performance Cost of Introducing Virtual Calls?. |
ICSM |
2005 |
DBLP DOI BibTeX RDF |
|
17 | Yusuke Sakabe, Masakazu Soshi, Atsuko Miyaji |
Java Obfuscation with a Theoretical Basis for Building Secure Mobile Agents. |
Communications and Multimedia Security |
2003 |
DBLP DOI BibTeX RDF |
security, computational complexity, mobile agents, static analysis, obfuscation |
17 | André DeHon |
Very Large Scale Spatial Computing. |
UMC |
2002 |
DBLP DOI BibTeX RDF |
|
17 | Hans-Wolfgang Loidl, Philip W. Trinder |
Engineering Large Parallel Functional Programs. |
Implementation of Functional Languages |
1997 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #67 of 67 (100 per page; Change: )
|
|