Showing 101 - 120 results of 222 for search '"obfuscation"', query time: 0.06s Refine Results
  1. 101

    Privacy of blockchain-enabled Internet of Vehicles by Tan, Ke Xiang

    Published 2022
    “…The implemented solutions will provide obfuscation of vehicular details through the usage of tokens and provide loose coupling between these tokens and their respective vehicles. …”
    Get full text
    Final Year Project (FYP)
  2. 102

    Graph-based malware detection on the Android phones by Neo, Sunny Yong Kwang

    Published 2014
    “…With it, we can exploit the semantics information that is difficult to alter even when the malware deployed code obfuscation. However the use of PDG through graph matching algorithm is not feasible because of subgraph isomorphism which is a NP-Complete problem and hence there is scalability issue. …”
    Get full text
    Final Year Project (FYP)
  3. 103

    Automated analysis of system-wide malware propagation by Korczynski, D

    Published 2019
    “…These unconventional, albeit perfectly valid, execution paradigms are used for evasion and obfuscation tactics and pose significant problems to automatic malware analysis environments.…”
    Thesis
  4. 104

    Remote Sensing, Inference, and Intelligence in the Information Environment by Galligani, Thomas

    Published 2023
    “…We begin by outlining three layers of complexity within this IE that make it exceedingly difficult to understand (strategic interaction, technological mediation, and cognitive obfuscation) and describe the framework of logical inference (induction, deduction, and abduction) that we use to assess research methodologies. …”
    Get full text
    Get full text
    Thesis
  5. 105

    Circuit analysis for camouflage netlists by Liu, YuCong

    Published 2021
    “…In this project, a seven-functioned standard logic cell is proposed using the “Dummy Via” hardware obfuscation method and a python Verilog simulator is made to implement an effective brute-force algorithm to attack the camouflaged cell.…”
    Get full text
    Final Year Project (FYP)
  6. 106

    Leader-follower tracking and simulation for two robotic manipulators by Li, Bowen

    Published 2024
    “…Alternatively, computer vision and sensors allow for more information to be gathered about the environment that can be factored into tracking, but at the same time may be affected by factors such as obfuscation by obstacles. This report aims to explore, design, and simulate leader-follower tracking strategies in a virtual CoppeliaSim environment using two 3-DOF robotic manipulator models…”
    Get full text
    Final Year Project (FYP)
  7. 107

    Structural features with nonnegative matrix factorization for metamorphic malware detection by Yeong, Tyng Ling, Mohd Sani, Nor Fazlida, Abdullah, Mohd. Taufik, Abdul Hamid, Nor Asilah Wati

    Published 2021
    “…Metamorphic malware is well known for evading signature-based detection by exploiting various code obfuscation techniques. Current metamorphic malware detection approaches require some prior knowledge during feature engineering stage to extract patterns and behaviors from malware. …”
    Get full text
    Article
  8. 108

    A review : Static analysis of android malware and detection technique by Juliza, Mohamad Arif, Mohd Faizal, Ab Razak, Suryanti, Awang, Sharfah Ratibah, Tuan Mat, Nor Syahidatul Nadiah, Ismail, Ahmad Firdaus, Zainal Abidin

    Published 2021
    “…Furthermore, some malware may be hidden inside the mobile device using various obfuscation techniques and cause harm. To mitigate these risks, the researcher recommended a variety of detection techniques. …”
    Get full text
    Conference or Workshop Item
  9. 109
  10. 110

    Optimal Bounded-Collusion Secure Functional Encryption by Ananth, Prabhanjan, Vaikuntanathan, Vinod

    Published 2021
    “…It is known that bounded-key functional encryption schemes with encryption complexity growing with ε > 0, for any constant Q1-λ, implies indistinguishability obfuscation. On the other hand, in the public-key setting, it was previously unknown whether we could achieve encryption complexity growing linear with Q, also known as optimal bounded-key FE, based on well-studied assumptions. …”
    Get full text
    Book
  11. 111

    From Selective to Adaptive Security in Functional Encryption by Ananth, Prabhanjan, Brakerski, Zvika, Segev, Gil, Vaikuntanathan, Vinod

    Published 2021
    “…The handful of known adaptively-secure schemes are based on specifically tailored techniques that rely on strong assumptions (such as obfuscation or multilinear maps assumptions) can be transformed into an adaptively-secure one without introducing any additional assumptions. …”
    Get full text
    Article
  12. 112

    Design automation for camouflage circuits by Ng, Chuan Seng

    Published 2020
    “…There are various methods available to defend against these attacks, such as integrated circuit (IC) camouflaging, design obfuscation, split manufacturing, but the method adopted in the project is to camouflage the logic gates in the digital logic circuit. …”
    Get full text
    Final Year Project (FYP)
  13. 113

    Machine-learning attacks on PolyPUFs, OB-PUFs, RPUFs, LHS-PUFs, and PUF–FSMs by Delvaux, Jeroen

    Published 2020
    “…The common flaw of all five designs is that the use of lightweight obfuscation logic provides insufficient protection against machine-learning attacks.…”
    Get full text
    Journal Article
  14. 114

    On hybrid network coding for visual traffic surveillance by Ling, Chih Wei, Datta, Anwitaman, Xu, Jun

    Published 2021
    “…We argue that network coding can be applied to leverage on an emerging fog architecture that relies on edge resources, to achieve higher throughput, saving up network bandwidth, and provide resilience to link failures, while also achieving simple obfuscation against wire-tapping attacks by linearly combining the source packets. …”
    Get full text
    Journal Article
  15. 115

    Swarm intelligence for protecting sensitive identities in complex networks by Zhao, Jie, Wang, Zhen, Yu, Dengxiu, Cao, Jinde, Cheong, Kang Hao

    Published 2024
    “…A novel fitness function based on structure entropy is proposed to promote the obfuscation of community structure, thereby hiding the membership of sensitive entities in networks. …”
    Get full text
    Journal Article
  16. 116

    A survey on current malicious javascript behavior of infected web content in detection of malicious web pages by Wan Nurulsafawati, Wan Manan, Mohd Nizam, Mohmad Kahar, Noorlin, Mohd Ali

    Published 2020
    “…However, the efficient detection of malicious web pages previously has generated many false alarm by the use of sophisticated obfuscation techniques in benign JavaScript code in web pages. …”
    Get full text
    Conference or Workshop Item
  17. 117

    Watermarking Cryptographic Capabilities by Cohen, Aloni(Aloni Jonathan), Holmgren, Justin Lee, Nishimaki, Ryo, Vaikuntanathan, Vinod, Wichs, Daniel

    Published 2020
    “…ACM, 59 (2012), 6] shows that, assuming indistinguishability obfuscation (iO), such watermarking is impossible if the marked program C evaluates the original program with perfect correctness. …”
    Get full text
    Article
  18. 118

    Multikey Fully Homomorphic Encryption and Applications by López-Alt, Adriana, Tromer, Eran, Vaikuntanathan, Vinod

    Published 2021
    “…This notion is qualitatively the best possible in minimizing interaction, since the users' interaction in the decryption stage is inevitable: we show that removing it would imply generic program obfuscation and is thus impossible. Our contributions are two-fold: (1) We define the new notion of multikey FHE, an enhanced FHE system which is capable of operating on inputs encrypted under multiple, unrelated keys. …”
    Get full text
    Article
  19. 119

    Rate-1 non-interactive arguments for batch-NP by Devadas, Lalita

    Published 2022
    “…Prior to this work, IVC schemes were only known for P under a bilinear map assumption, and beyond P only under non-standard knowledge assumptions or in the random oracle model; multi-hop BARGs were only known under non-standard knowledge assumptions or in the random oracle model; and aggregate signatures were only known under indistinguishability obfuscation (and RSA) or in the random oracle model.…”
    Get full text
    Thesis
  20. 120

    Essays in System Dynamics for Operations Management: Policy, Platforms and Pricing by López Quirós, Jose Luis

    Published 2024
    “…Chapter 3 studies the effects of a common price obfuscation tactic, namely the use of shrouded hidden fees on consumer behavior and platform firm performance. …”
    Get full text
    Thesis