-
61
TAD : time side-channel attack defense of obfuscated source code
Published 2021Subjects: Get full text
Conference Paper -
62
Software protection system : binary control flow obfuscation for portable executables
Published 2012“…This project features a custom devised obfuscation design that incorporates several modified binary-level obfuscation techniques. …”
Get full text
Final Year Project (FYP) -
63
Metior: A Comprehensive Model to Evaluate Obfuscating Side-Channel Defense Schemes
Published 2023Get full text
Article -
64
Enhancing obfuscation technique for protecting source code against software reverse engineering
Published 2019“…Obfuscation techniques allow the programmer to customize which part of the code to be obfuscated. …”
Get full text
Thesis -
65
Search and Obfuscation in a Technologically Changing Retail Environment: Some Thoughts on Implications and Policy
Published 2021“…Just as technologies have made price search easier, however, they have increased incentives that firms have to obfuscate, or make price search harder. In this article, we focus on these actions that firms take and their effects on market participants. …”
Get full text
Article -
66
Hybrid obfuscation technique to protect source code from prohibited software reverse engineering
Published 2020“…In this research, a new Hybrid Obfuscation Technique was proposed to prevent prohibited Reverse Engineering. …”
Get full text
Article -
67
An enhancement of the random sequence 3-level obfuscated algorithm for protecting agents malicious hosts
Published 2007“…The effectiveness of the obfuscation algorithm is enhanced by addition of noise, which surrounds the true value carried by the agent with false values. …”
Get full text
Article -
68
-
69
Software protection system - II
Published 2012“…An obfuscator prototype based on this design is developed and tested against the obfuscation qualities – potency, resilience, stealth and cost, suggested by Collberg et al. …”
Get full text
Final Year Project (FYP) -
70
-
71
-
72
Security risk evaluation for logic locking
Published 2024“…Boolean Satisfiability (SAT) attacks can almost break all existent logic obfuscation techniques. It is accepted as a powerful tool to assess the security of the logic obfuscation methods by the academia as well. …”
Get full text
Final Year Project (FYP) -
73
Software protection system – I
Published 2013“…This project report will discuss Software Obfuscation, which is one of the main techniques for preventing Reverse Engineering. …”
Get full text
Final Year Project (FYP) -
74
-
75
On Analysis and Effectiveness of Signature Based in Detecting Metamorphic Virus
Published 2013“…In this paper we first developed a code obfuscation engine. We then used this engine to create metamorphic variants of a seed virus and performed the validity of the statement about metamorphic viruses and signature based detectors. …”
Get full text
Article -
76
-
77
A Note on Perfect Correctness by Derandomization
Published 2022“…We show a general compiler that transforms a large class of erroneous cryptographic schemes (such as public-key encryption, indistinguishability obfuscation, and secure multiparty computation schemes) into perfectly correct ones. …”
Get full text
Article -
78
Price Competition Reduction Strategies in Chinese B2C E-Commerce Markets: A Case Study
Published 2022“…Evidence shows that firms around the world are practicing price fixing and price obfuscation to reduce price competition for higher profits. …”
Get full text
Thesis -
79
A Note on Perfect Correctness by Derandomization
Published 2021“…We show a general compiler that transforms a large class of erroneous cryptographic schemes (such as public-key encryption, indistinguishability obfuscation, and secure multiparty computation schemes) into perfectly correct ones. …”
Get full text
Article -
80
Logic locking satisfiability evaluation based on machine learning techniques
Published 2024“…This scenario underscores the need for robust logic obfuscation solutions to mitigate these risks. Despite this, Boolean Satisfiability (SAT) attacks and related methods can nearly breach all advanced logic obfuscation techniques. …”
Get full text
Thesis-Master by Coursework