|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 385 occurrences of 212 keywords
|
|
|
Results
Found 1965 publication records. Showing 1965 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
185 | Nikolay Kuzurin, Alexander V. Shokurov, Nikolay P. Varnovsky, Vladimir A. Zakharov |
On the Concept of Software Obfuscation in Computer Security. |
ISC |
2007 |
DBLP DOI BibTeX RDF |
Program obfuscation, security, encryption, Turing machine |
102 | Ran Canetti, Ronny Ramzi Dakdouk |
Obfuscating Point Functions with Multibit Output. |
EUROCRYPT |
2008 |
DBLP DOI BibTeX RDF |
composable obfuscation, multibit point function obfuscation, digital locker, point function obfuscation, obfuscation |
101 | Mila Dalla Preda, Roberto Giacobazzi |
Semantic-Based Code Obfuscation by Abstract Interpretation. |
ICALP |
2005 |
DBLP DOI BibTeX RDF |
Semantics, Program Transformation, Abstract Interpretation, Code Obfuscation |
101 | Xiaotong Zhuang, Tao Zhang 0037, Hsien-Hsin S. Lee, Santosh Pande |
Hardware assisted control flow obfuscation for embedded processors. |
CASES |
2004 |
DBLP DOI BibTeX RDF |
obfuscation, control flow graph |
101 | Mikhail Sosonkin, Gleb Naumovich, Nasir D. Memon |
Obfuscation of design intent in object-oriented applications. |
Digital Rights Management Workshop |
2003 |
DBLP DOI BibTeX RDF |
code generation, refactoring, software obfuscation |
89 | Mila Dalla Preda, Roberto Giacobazzi |
Control Code Obfuscation by Abstract Interpretation. |
SEFM |
2005 |
DBLP DOI BibTeX RDF |
Semantics, Program Transformation, Program analysis, Abstract Interpretation, Code Obfuscation |
82 | Yu-Lun Huang, F. S. Ho, Hsin-Yi Tsai, H. M. Kao |
A control flow obfuscation method to discourage malicious tampering of software codes. |
AsiaCCS |
2006 |
DBLP DOI BibTeX RDF |
control flow obfuscation, reverse engineering, tamper-resistance, intellectual property protection, software obfuscation |
77 | Stephen Drape, Irina Voiculescu |
Creating Transformations for Matrix Obfuscation. |
SAS |
2009 |
DBLP DOI BibTeX RDF |
Program Transformations, Information Hiding, Obfuscation, Matrix Operations |
77 | Praveen Sivadasan, P. Sojan Lal, Naveen Sivadasan |
JDATATRANS for array obfuscation in Java source codes to defeat reverse engineering from decompiled codes. |
Bangalore Compute Conf. |
2009 |
DBLP DOI BibTeX RDF |
restructured arrays, source code obfuscation, reverse engineering |
77 | Mariano Ceccato, Massimiliano Di Penta, Jasvir Nagra, Paolo Falcarin, Filippo Ricca, Marco Torchiano, Paolo Tonella |
Towards experimental evaluation of code obfuscation techniques. |
QoP |
2008 |
DBLP DOI BibTeX RDF |
empirical studies, software obfuscation |
77 | Matias Madou, Ludo Van Put, Koen De Bosschere |
LOCO: an interactive code (De)obfuscation tool. |
PEPM |
2006 |
DBLP DOI BibTeX RDF |
security, binary rewriting, code obfuscation |
76 | Nikolay P. Varnovsky, Vladimir A. Zakharov |
On the Possibility of Provably Secure Obfuscating Programs. |
Ershov Memorial Conference |
2003 |
DBLP DOI BibTeX RDF |
hard-core predicate, security, program transformation, mutual information, obfuscation, one-way function |
73 | Mariano Ceccato, Massimiliano Di Penta, Jasvir Nagra, Paolo Falcarin, Filippo Ricca, Marco Torchiano, Paolo Tonella |
The effectiveness of source code obfuscation: An experimental assessment. |
ICPC |
2009 |
DBLP DOI BibTeX RDF |
|
73 | Matt Duckham, Lars Kulik |
Simulation of Obfuscation and Negotiation for Location Privacy. |
COSIT |
2005 |
DBLP DOI BibTeX RDF |
|
65 | Byoungyoung Lee, Yuna Kim, Jong Kim 0001 |
binOb+: a framework for potent and stealthy binary obfuscation. |
AsiaCCS |
2010 |
DBLP DOI BibTeX RDF |
binary obfuscation, stealth, windows SEH, reverse engineering, exception handling |
65 | Seongje Cho, Hyeyoung Chang, Yookun Cho |
Implementation of an Obfuscation Tool for C/C++ Source Code Protection on the XScale Architecture. |
SEUS |
2008 |
DBLP DOI BibTeX RDF |
Source Code Protection, Reverse Engineering, Obfuscation |
65 | Jafar Haadi Jafarian, Ali Noorollahi Ravari, Morteza Amini, Rasool Jalili |
Protecting Location Privacy through a Graph-Based Location Representation and a Robust Obfuscation Technique. |
ICISC |
2008 |
DBLP DOI BibTeX RDF |
Obfuscation Techniques, Reliability, Distributed Architecture, Location Privacy, Middleware Architecture |
65 | Dennis Hofheinz, John Malone-Lee, Martijn Stam |
Obfuscation for Cryptographic Purposes. |
TCC |
2007 |
DBLP DOI BibTeX RDF |
point functions, obfuscation |
65 | Mahadevan Gomathisankaran, Akhilesh Tyagi |
Architecture Support for 3D Obfuscation. |
IEEE Trans. Computers |
2006 |
DBLP DOI BibTeX RDF |
secure systems architecture, digital rights management, Obfuscation |
65 | Anirban Majumdar 0001, Clark D. Thomborson |
Manufacturing opaque predicates in distributed systems for code obfuscation. |
ACSC |
2006 |
DBLP BibTeX RDF |
distributed predicate detection, mobile code protection, opaque predicates, software protection, distributed systems security, code obfuscation |
65 | Yusuke Sakabe, Masakazu Soshi, Atsuko Miyaji |
Java Obfuscation with a Theoretical Basis for Building Secure Mobile Agents. |
Communications and Multimedia Security |
2003 |
DBLP DOI BibTeX RDF |
security, computational complexity, mobile agents, static analysis, obfuscation |
65 | Chao Dai, Jianmin Pang, Rongcai Zhao, Xiaojun Ma |
Static Analysis of the Disassembly against Malicious Code Obfuscated with Conditional Jumps. |
ACIS-ICIS |
2008 |
DBLP DOI BibTeX RDF |
conditional jump, obfuscation, malicious codes, disassembly |
65 | Louis Goubin, Jean-Michel Masereel, Michaël Quisquater |
Cryptanalysis of White Box DES Implementations. |
Selected Areas in Cryptography |
2007 |
DBLP DOI BibTeX RDF |
cryptanalysis, block cipher, DES, Obfuscation, symmetric cryptography |
61 | Kazuhide Fukushima, Shinsaku Kiyomoto, Toshiaki Tanaka |
Obfuscation Mechanism in Conjunction with Tamper-Proof Module. |
CSE (2) |
2009 |
DBLP DOI BibTeX RDF |
|
61 | Shafi Goldwasser |
Program Obfuscation and One-Time Programs. |
CT-RSA |
2008 |
DBLP DOI BibTeX RDF |
|
61 | Shafi Goldwasser, Guy N. Rothblum |
On Best-Possible Obfuscation. |
TCC |
2007 |
DBLP DOI BibTeX RDF |
|
61 | Ben Lynn, Manoj Prabhakaran 0001, Amit Sahai |
Positive Results and Techniques for Obfuscation. |
EUROCRYPT |
2004 |
DBLP DOI BibTeX RDF |
|
60 | Philippe Beaucamps, Eric Filiol |
On the possibility of practically obfuscating programs towards a unified perspective of code protection. |
J. Comput. Virol. |
2007 |
DBLP DOI BibTeX RDF |
|
60 | Susan Hohenberger, Guy N. Rothblum, Abhi Shelat, Vinod Vaikuntanathan |
Securely Obfuscating Re-encryption. |
TCC |
2007 |
DBLP DOI BibTeX RDF |
|
53 | Shenoda Guirguis, Alok Pareek |
BronzeGate: real-time transactional data obfuscation for GoldenGate. |
EDBT |
2010 |
DBLP DOI BibTeX RDF |
data obfuscation, real-time transactional data management, security, privacy, usability, masking |
53 | Bertrand Anckaert, Matias Madou, Bjorn De Sutter, Bruno De Bus, Koen De Bosschere, Bart Preneel |
Program obfuscation: a quantitative approach. |
QoP |
2007 |
DBLP DOI BibTeX RDF |
program obfuscation, metrics, quantification |
53 | Valery Pryamikov |
Call Tree Transformation for Program Obfuscation and Copy Protection. |
DRMTICS |
2005 |
DBLP DOI BibTeX RDF |
Software Copy Protection, Software Watermarking, Software Obfuscation |
53 | David E. Bakken, Rupa Parameswaran, Douglas M. Blough, Andy A. Franz, Ty J. Palmer |
Data Obfuscation: Anonymity and Desensitization of Usable Data Sets. |
IEEE Secur. Priv. |
2004 |
DBLP DOI BibTeX RDF |
data obfuscation, data sharing, data privacy |
53 | Srivatsan Narayanan, Ananth Raghunathan, Ramarathnam Venkatesan |
Obfuscating straight line arithmetic programs. |
Digital Rights Management Workshop |
2009 |
DBLP DOI BibTeX RDF |
hard-to-factor polynomials, straight line arithmetic programs, drm, obfuscation, software protection, secure hardware |
53 | Xiangdong An 0001, Dawn N. Jutla, Nick Cercone |
Temporal Context Lie Detection and Generation. |
Secure Data Management |
2006 |
DBLP DOI BibTeX RDF |
pervasive computing, obfuscation, dynamic Bayesian networks, inference control, uncertain reasoning, Privacy management, context inference |
53 | Mihai Christodorescu, Somesh Jha |
Testing malware detectors. |
ISSTA |
2004 |
DBLP DOI BibTeX RDF |
malware, obfuscation, adaptive testing, anti-virus |
49 | Ran Canetti, Mayank Varia |
Non-malleable Obfuscation. |
TCC |
2009 |
DBLP DOI BibTeX RDF |
|
49 | Shafi Goldwasser, Yael Tauman Kalai |
On the Impossibility of Obfuscation with Auxiliary Input. |
FOCS |
2005 |
DBLP DOI BibTeX RDF |
|
49 | Mahadevan Gomathisankaran, Akhilesh Tyagi |
Arc3D: A 3D Obfuscation Architecture. |
HiPEAC |
2005 |
DBLP DOI BibTeX RDF |
|
49 | Kelly Heffner, Christian S. Collberg |
The Obfuscation Executive. |
ISC |
2004 |
DBLP DOI BibTeX RDF |
|
49 | Kazuhide Fukushima, Kouichi Sakurai |
A Software Fingerprinting Scheme for Java Using Classfiles Obfuscation. |
WISA |
2003 |
DBLP DOI BibTeX RDF |
|
48 | Sharath K. Udupa, Saumya K. Debray, Matias Madou |
Deobfuscation: Reverse Engineering Obfuscated Code. |
WCRE |
2005 |
DBLP DOI BibTeX RDF |
|
48 | Ralph Gross, Edoardo M. Airoldi, Bradley A. Malin, Latanya Sweeney |
Integrating Utility into Face De-identification. |
Privacy Enhancing Technologies |
2005 |
DBLP DOI BibTeX RDF |
|
48 | Matthias Jacob, Dan Boneh, Edward W. Felten |
Attacking an Obfuscated Cipher by Injecting Faults. |
Digital Rights Management Workshop |
2002 |
DBLP DOI BibTeX RDF |
|
41 | Rajat Subhra Chakraborty, Swarup Bhunia |
Hardware protection and authentication through netlist level obfuscation. |
ICCAD |
2008 |
DBLP DOI BibTeX RDF |
IP piracy, design for security, hardware authentication, hardware obfuscation, hardware protection |
41 | Jun Ge, Soma Chaudhuri, Akhilesh Tyagi |
Control flow based obfuscation. |
Digital Rights Management Workshop |
2005 |
DBLP DOI BibTeX RDF |
control flow, software obfuscation |
41 | Cullen Linn, Saumya K. Debray |
Obfuscation of executable code to improve resistance to static disassembly. |
CCS |
2003 |
DBLP DOI BibTeX RDF |
disassembly, code obfuscation |
41 | Christian S. Collberg, Clark D. Thomborson |
Watermarking, Tamper-Proofing, and Obfuscation-Tools for Software Protection. |
IEEE Trans. Software Eng. |
2002 |
DBLP DOI BibTeX RDF |
watermarking, Obfuscation, intellectual property protection, tamper-proofing |
41 | Fahim K. Sufi, Ibrahim Khalil |
A New Feature Detection Mechanism and Its Application in Secured ECG Transmission with Noise Masking. |
J. Medical Syst. |
2009 |
DBLP DOI BibTeX RDF |
ECG obfuscation, ECG feature detection, Securing ECG data, ECG encryption, HIPAA |
41 | Stephen Drape, Anirban Majumdar 0001, Clark D. Thomborson |
Slicing Aided Design of Obfuscating Transforms. |
ACIS-ICIS |
2007 |
DBLP DOI BibTeX RDF |
Program Transformation, Slicing, Obfuscation |
41 | Stephen Drape, Clark D. Thomborson, Anirban Majumdar 0001 |
Specifying Imperative Data Obfuscations. |
ISC |
2007 |
DBLP DOI BibTeX RDF |
Data Obfuscation, Specification, Refinement, Correctness |
41 | Rafail Ostrovsky, William E. Skeith III |
Private Searching on Streaming Data. |
CRYPTO |
2005 |
DBLP DOI BibTeX RDF |
Crypto-computing, Public-key Encryption with special properties, Privacy-Preserving Keyword Search, Secure Algorithms for Streaming Data, Privacy-Preserving Datamining, Secure Delegation of Computation, Searching with Privacy, Software security, Mobile code, Database security, Private Information Retrieval, Code Obfuscation |
41 | Sandra Ring, Eric Cole |
Taking a Lesson from Stealthy Rootkits. |
IEEE Secur. Priv. |
2004 |
DBLP DOI BibTeX RDF |
reverse engineering, rootkits, malicious code, software obfuscation |
38 | Dongxue Pan, Hongda Li 0001, Peifang Ni |
Candidate Differing-Inputs Obfuscation from Indistinguishability Obfuscation and Auxiliary-Input Point Obfuscation. |
IACR Cryptol. ePrint Arch. |
2018 |
DBLP BibTeX RDF |
|
37 | John Aycock, Juan M. Gutiérrez Cárdenas, Daniel Medeiros Nunes de Castro |
Code Obfuscation Using Pseudo-random Number Generators. |
CSE (3) |
2009 |
DBLP DOI BibTeX RDF |
|
37 | Jean-Marie Borello, Ludovic Mé |
Code obfuscation techniques for metamorphic viruses. |
J. Comput. Virol. |
2008 |
DBLP DOI BibTeX RDF |
|
37 | Maciej Brzozowski, Vyacheslav N. Yarmolik |
Obfuscation as Intellectual Rights Protection in VHDL Language. |
CISIM |
2007 |
DBLP DOI BibTeX RDF |
|
37 | William Zhu 0001, Clark D. Thomborson, Fei-Yue Wang 0001 |
Applications of Homomorphic Functions to Software Obfuscation. |
WISI |
2006 |
DBLP DOI BibTeX RDF |
|
37 | Matt Duckham, Lars Kulik |
A Formal Model of Obfuscation and Negotiation for Location Privacy. |
Pervasive |
2005 |
DBLP DOI BibTeX RDF |
|
37 | Tatsuya Toyofuku, Toshihiro Tabata, Kouichi Sakurai |
Program Obfuscation Scheme Using Random Numbers to Complicate Control Flow. |
EUC Workshops |
2005 |
DBLP DOI BibTeX RDF |
|
37 | Ryan Wishart, Karen Henricksen, Jadwiga Indulska |
Context Obfuscation for Privacy via Ontological Descriptions. |
LoCA |
2005 |
DBLP DOI BibTeX RDF |
|
36 | Amitabh Saxena, Brecht Wyseur, Bart Preneel |
Towards Security Notions for White-Box Cryptography. |
ISC |
2009 |
DBLP DOI BibTeX RDF |
|
36 | Xinran Wang, Yoon-chan Jhi, Sencun Zhu, Peng Liu 0005 |
STILL: Exploit Code Detection via Static Taint and Initialization Analyses. |
ACSAC |
2008 |
DBLP DOI BibTeX RDF |
|
36 | Abhishek RayChaudhuri, Ujwal K. Chinthala, Amiya Bhattacharya |
Obfuscating temporal context of sensor data by coalescing at source. |
ACM SIGMOBILE Mob. Comput. Commun. Rev. |
2007 |
DBLP DOI BibTeX RDF |
|
36 | Satoshi Hada, Kouichi Sakurai |
A Note on the (Im)possibility of Using Obfuscators to Transform Private-Key Encryption into Public-Key Encryption. |
IWSEC |
2007 |
DBLP DOI BibTeX RDF |
|
36 | Claudio Agostino Ardagna, Marco Cremonini, Ernesto Damiani, Sabrina De Capitani di Vimercati, Pierangela Samarati |
Managing Privacy in LBAC Systems. |
AINA Workshops (2) |
2007 |
DBLP DOI BibTeX RDF |
|
36 | Andreas Moser, Christopher Kruegel, Engin Kirda |
Limits of Static Analysis for Malware Detection. |
ACSAC |
2007 |
DBLP DOI BibTeX RDF |
|
36 | Mila Dalla Preda, Matias Madou, Koen De Bosschere, Roberto Giacobazzi |
Opaque Predicates Detection by Abstract Interpretation. |
AMAST |
2006 |
DBLP DOI BibTeX RDF |
|
36 | Xiangdong An 0001, Dawn N. Jutla, Nick Cercone |
Reasoning about obfuscated private information: who have lied and how to lie. |
WPES |
2006 |
DBLP DOI BibTeX RDF |
Bayesian networks, privacy protection, inference control, ubiquitous environments |
36 | Yu Yu, Jussipekka Leiwo, A. Benjamin Premkumar |
Hiding Circuit Topology from Unbounded Reverse Engineers. |
ACISP |
2006 |
DBLP DOI BibTeX RDF |
|
36 | Boaz Barak, Oded Goldreich 0001, Russell Impagliazzo, Steven Rudich, Amit Sahai, Salil P. Vadhan, Ke Yang 0005 |
On the (Im)possibility of Obfuscating Programs. |
CRYPTO |
2001 |
DBLP DOI BibTeX RDF |
|
29 | Philip O'Kane, Sakir Sezer, Kieran McLaughlin |
Obfuscation: The Hidden Malware. |
IEEE Secur. Priv. |
2011 |
DBLP DOI BibTeX RDF |
packer, metamorphism, computer security, polymorphism, malware, obfuscation |
29 | Teng Long, Lin Liu 0001, Yijun Yu, Zhiguo Wan |
Assure High Quality Code Using Refactoring and Obfuscation Techniques. |
FCST |
2010 |
DBLP DOI BibTeX RDF |
Software Quality, Refactoring, Obfuscation, i* |
29 | Haibo Chen 0001, Liwei Yuan, Xi Wu 0001, Binyu Zang, Bo Huang 0002, Pen-Chung Yew |
Control flow obfuscation with information flow tracking. |
MICRO |
2009 |
DBLP DOI BibTeX RDF |
control flow obfuscation, opaque predicate, information flow tracking, control speculation |
29 | Jusuk Lee, Kyoochang Jeong, Heejo Lee |
Detecting metamorphic malwares using code graphs. |
SAC |
2010 |
DBLP DOI BibTeX RDF |
code graph, metamorphic malware, static analysis, code obfuscation |
29 | Mariano Ceccato, Paolo Tonella, Mila Dalla Preda, Anirban Majumdar 0004 |
Remote software protection by orthogonal client replacement. |
SAC |
2009 |
DBLP DOI BibTeX RDF |
remote trusting, program transformation, software security, obfuscation, clone detection |
29 | Hoeteck Wee |
Zero Knowledge in the Random Oracle Model, Revisited. |
ASIACRYPT |
2009 |
DBLP DOI BibTeX RDF |
sequential composition, zero-knowledge, obfuscation, random oracle model |
29 | Yameng Bai, Xingming Sun, Guang Sun, Xiaohong Deng, Xiaoming Zhou |
Dynamic K-Gram Based Software Birthmark. |
Australian Software Engineering Conference |
2008 |
DBLP DOI BibTeX RDF |
Software Theft, k-gram, Obfuscation, Dynamic Program Slicing, Software Birthmark |
29 | Daniel Slamanig, Christian Stingl |
Privacy Aspects of eHealth. |
ARES |
2008 |
DBLP DOI BibTeX RDF |
Identity Management, Obfuscation, Pseudonymization, Anonymous Authentication |
29 | Karen Heyman |
New Attack Tricks Antivirus Software. |
Computer |
2007 |
DBLP DOI BibTeX RDF |
antivirus software, dynamic code obfuscation, DCO attacks |
29 | Anirban Majumdar 0001, Stephen Drape, Clark D. Thomborson |
Metrics-based Evaluation of Slicing Obfuscations. |
IAS |
2007 |
DBLP DOI BibTeX RDF |
Evaluation, Metrics, Slicing, Obfuscation |
29 | Matthias Jacob, Mariusz H. Jakubowski, Ramarathnam Venkatesan |
Towards integral binary execution: implementing oblivious hashing using overlapped instruction encodings. |
MM&Sec |
2007 |
DBLP DOI BibTeX RDF |
anti-disassembly, oblivious hashing, overlapped code, obfuscation, tamper-resistance, integrity checking |
29 | Anirban Majumdar 0001, Stephen Drape, Clark D. Thomborson |
Slicing obfuscations: design, correctness, and evaluation. |
Digital Rights Management Workshop |
2007 |
DBLP DOI BibTeX RDF |
program transformation, digital rights management, software security, obfuscation, static slicing |
29 | Ariel Futoransky, Emiliano Kargieman, Carlos Sarraute, Ariel Waissbein |
Foundations and applications for secure triggers. |
ACM Trans. Inf. Syst. Secur. |
2006 |
DBLP DOI BibTeX RDF |
Malicious host problem, secure triggers, obfuscation, universally composable security, mobile code security |
29 | Abdulrahman Alarifi, Wenliang Du |
Diversify sensor nodes to improve resilience against node compromise. |
SASN |
2006 |
DBLP DOI BibTeX RDF |
wireless sensor networks, reverse engineering, diversity, obfuscation |
29 | Arvind Narayanan, Vitaly Shmatikov |
Obfuscated databases and group privacy. |
CCS |
2005 |
DBLP DOI BibTeX RDF |
obfuscation, database privacy |
29 | Wenliang Du, Michael T. Goodrich |
Searching for High-Value Rare Events with Uncheatable Grid Computing. |
ACNS |
2005 |
DBLP DOI BibTeX RDF |
security, Grid computing, obfuscation, cheating, cryptographic hash functions |
29 | Hoeteck Wee |
On obfuscating point functions. |
STOC |
2005 |
DBLP DOI BibTeX RDF |
obfuscation |
29 | Yevgeniy Dodis, Adam D. Smith |
Correcting errors without leaking partial information. |
STOC |
2005 |
DBLP DOI BibTeX RDF |
entropic security, cryptography, error-correcting codes, randomness extractors, code obfuscation, bounded storage model, information reconciliation |
29 | Lori Vinciguerra, Linda M. Wills, Nidhi Kejriwal, Paul Martino, Ralph L. Vinciguerra |
An Experimentation Framework for Evaluating Disassembly and Decompilation Tools for C++ and Java. |
WCRE |
2003 |
DBLP DOI BibTeX RDF |
binary reverse engineering, obfuscation, binary translation, decompilation, disassembly |
29 | Gaël Hachez, Laurent Den Hollander, Mehrdad Jalali, Jean-Jacques Quisquater, Christophe Vasserot |
Towards a Practical Secure Framework for Mobile Code Commerce. |
ISW |
2000 |
DBLP DOI BibTeX RDF |
electronic right management, electronic commerce, watermarking, copyright protection, obfuscation, software piracy |
29 | Jens Palsberg, S. Krishnaswamy, Minseok Kwon, Di Ma, Qiuyun Shao, Y. Zhang |
Experience with Software Watermarking. |
ACSAC |
2000 |
DBLP DOI BibTeX RDF |
program-transformation attacks, heap-space usage, watermark retrieval time, protection technique, tamperproofing, Java, Java, data structures, security of data, execution times, obfuscation, dynamic data structures, code size, software watermarking, copy protection |
29 | Christian S. Collberg, Clark D. Thomborson, Douglas Low |
Breaking Abstractions and Unstructuring Data Structures. |
ICCL |
1998 |
DBLP DOI BibTeX RDF |
obfuscation, intellectual property protection, code transformations |
25 | Patrick Kochberger, Maximilian Gramberger, Sebastian Schrittwieser, Caroline Lawitschka, Edgar R. Weippl |
Large Language Models for Code Obfuscation Evaluation of the Obfuscation Capabilities of OpenAI's GPT-3.5 on C Source Code. |
SECRYPT |
2023 |
DBLP DOI BibTeX RDF |
|
25 | Julien Cassagne, Ettore Merlo, Guy-Vincent Jourdan, Iosif-Viorel Onut |
Following the Obfuscation Trail: Identifying and Exploiting Obfuscation Signatures in Malicious Code. |
FPS (1) |
2023 |
DBLP DOI BibTeX RDF |
|
25 | Andrew Wintenberg, Stéphane Lafortune, Necmiye Ozay |
Communication Obfuscation for Privacy and Utility against Obfuscation-Aware Eavesdroppers. |
ACC |
2022 |
DBLP DOI BibTeX RDF |
|
25 | Xiaolu Zhang, Frank Breitinger, Engelbert Luechinger, Stephen O'Shaughnessy |
Android application forensics: A survey of obfuscation, obfuscation detection and deobfuscation techniques and their impact on investigations. |
Digit. Investig. |
2021 |
DBLP DOI BibTeX RDF |
|
25 | Qipeng Liu 0001, Mark Zhandry |
Decomposable Obfuscation: A Framework for Building Applications of Obfuscation from Polynomial Hardness. |
J. Cryptol. |
2021 |
DBLP DOI BibTeX RDF |
|
25 | Hui Xu 0009, Yangfan Zhou, Jiang Ming 0002, Michael R. Lyu |
Layered obfuscation: a taxonomy of software obfuscation techniques for layered security. |
Cybersecur. |
2020 |
DBLP DOI BibTeX RDF |
|
25 | Zhichao Wang, Yiwei Shan, Zhi Yang, Ruoyi Wang, Shuang Song |
Semantic redirection obfuscation: A control flow obfuscation based on Android Runtime. |
TrustCom |
2020 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #100 of 1965 (100 per page; Change: ) Pages: [ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ >>] |
|