Showing 61 - 80 results of 203 for search '"obfuscation"', query time: 0.06s Refine Results
  1. 61
  2. 62

    Software protection system : binary control flow obfuscation for portable executables by Chew, Ron Jun Hong.

    Published 2012
    “…This project features a custom devised obfuscation design that incorporates several modified binary-level obfuscation techniques. …”
    Get full text
    Final Year Project (FYP)
  3. 63
  4. 64

    Enhancing obfuscation technique for protecting source code against software reverse engineering by Mahfoudh, Asma

    Published 2019
    “…Obfuscation techniques allow the programmer to customize which part of the code to be obfuscated. …”
    Get full text
    Thesis
  5. 65

    Search and Obfuscation in a Technologically Changing Retail Environment: Some Thoughts on Implications and Policy by Ellison, Glenn, Ellison, Sara Fisher

    Published 2021
    “…Just as technologies have made price search easier, however, they have increased incentives that firms have to obfuscate, or make price search harder. In this article, we focus on these actions that firms take and their effects on market participants. …”
    Get full text
    Article
  6. 66
  7. 67

    An enhancement of the random sequence 3-level obfuscated algorithm for protecting agents malicious hosts by Abu Bakar, Kamalrulnizam, Bernard, S. Doherty

    Published 2007
    “…The effectiveness of the obfuscation algorithm is enhanced by addition of noise, which surrounds the true value carried by the agent with false values. …”
    Get full text
    Article
  8. 68
  9. 69

    Software protection system - II by Hong, Dexter Xian Jun.

    Published 2012
    “…An obfuscator prototype based on this design is developed and tested against the obfuscation qualities – potency, resilience, stealth and cost, suggested by Collberg et al. …”
    Get full text
    Final Year Project (FYP)
  10. 70
  11. 71
  12. 72

    Security risk evaluation for logic locking by Diao, Shengjia

    Published 2024
    “…Boolean Satisfiability (SAT) attacks can almost break all existent logic obfuscation techniques. It is accepted as a powerful tool to assess the security of the logic obfuscation methods by the academia as well. …”
    Get full text
    Final Year Project (FYP)
  13. 73

    Software protection system – I by Lim, Hwee.

    Published 2013
    “…This project report will discuss Software Obfuscation, which is one of the main techniques for preventing Reverse Engineering. …”
    Get full text
    Final Year Project (FYP)
  14. 74
  15. 75

    On Analysis and Effectiveness of Signature Based in Detecting Metamorphic Virus by Imran Edzereiq, Kamarudin, Syahrizal Azmir, Md Sharif, Tutut, Herawan

    Published 2013
    “…In this paper we first developed a code obfuscation engine. We then used this engine to create metamorphic variants of a seed virus and performed the validity of the statement about metamorphic viruses and signature based detectors. …”
    Get full text
    Article
  16. 76
  17. 77

    A Note on Perfect Correctness by Derandomization by Bitansky, Nir, Vaikuntanathan, Vinod

    Published 2022
    “…We show a general compiler that transforms a large class of erroneous cryptographic schemes (such as public-key encryption, indistinguishability obfuscation, and secure multiparty computation schemes) into perfectly correct ones. …”
    Get full text
    Article
  18. 78

    Price Competition Reduction Strategies in Chinese B2C E-Commerce Markets: A Case Study by Liu, Kaiwen

    Published 2022
    “…Evidence shows that firms around the world are practicing price fixing and price obfuscation to reduce price competition for higher profits. …”
    Get full text
    Thesis
  19. 79

    A Note on Perfect Correctness by Derandomization by Bitansky, Nir, Vaikuntanathan, Vinod

    Published 2021
    “…We show a general compiler that transforms a large class of erroneous cryptographic schemes (such as public-key encryption, indistinguishability obfuscation, and secure multiparty computation schemes) into perfectly correct ones. …”
    Get full text
    Article
  20. 80

    Logic locking satisfiability evaluation based on machine learning techniques by Han, Yifei

    Published 2024
    “…This scenario underscores the need for robust logic obfuscation solutions to mitigate these risks. Despite this, Boolean Satisfiability (SAT) attacks and related methods can nearly breach all advanced logic obfuscation techniques. …”
    Get full text
    Thesis-Master by Coursework