-
101
Privacy of blockchain-enabled Internet of Vehicles
Published 2022“…The implemented solutions will provide obfuscation of vehicular details through the usage of tokens and provide loose coupling between these tokens and their respective vehicles. …”
Get full text
Final Year Project (FYP) -
102
Graph-based malware detection on the Android phones
Published 2014“…With it, we can exploit the semantics information that is difficult to alter even when the malware deployed code obfuscation. However the use of PDG through graph matching algorithm is not feasible because of subgraph isomorphism which is a NP-Complete problem and hence there is scalability issue. …”
Get full text
Final Year Project (FYP) -
103
Automated analysis of system-wide malware propagation
Published 2019“…These unconventional, albeit perfectly valid, execution paradigms are used for evasion and obfuscation tactics and pose significant problems to automatic malware analysis environments.…”
Thesis -
104
Remote Sensing, Inference, and Intelligence in the Information Environment
Published 2023“…We begin by outlining three layers of complexity within this IE that make it exceedingly difficult to understand (strategic interaction, technological mediation, and cognitive obfuscation) and describe the framework of logical inference (induction, deduction, and abduction) that we use to assess research methodologies. …”
Get full text
Get full text
Thesis -
105
Circuit analysis for camouflage netlists
Published 2021“…In this project, a seven-functioned standard logic cell is proposed using the “Dummy Via” hardware obfuscation method and a python Verilog simulator is made to implement an effective brute-force algorithm to attack the camouflaged cell.…”
Get full text
Final Year Project (FYP) -
106
Leader-follower tracking and simulation for two robotic manipulators
Published 2024“…Alternatively, computer vision and sensors allow for more information to be gathered about the environment that can be factored into tracking, but at the same time may be affected by factors such as obfuscation by obstacles. This report aims to explore, design, and simulate leader-follower tracking strategies in a virtual CoppeliaSim environment using two 3-DOF robotic manipulator models…”
Get full text
Final Year Project (FYP) -
107
Structural features with nonnegative matrix factorization for metamorphic malware detection
Published 2021“…Metamorphic malware is well known for evading signature-based detection by exploiting various code obfuscation techniques. Current metamorphic malware detection approaches require some prior knowledge during feature engineering stage to extract patterns and behaviors from malware. …”
Get full text
Article -
108
A review : Static analysis of android malware and detection technique
Published 2021“…Furthermore, some malware may be hidden inside the mobile device using various obfuscation techniques and cause harm. To mitigate these risks, the researcher recommended a variety of detection techniques. …”
Get full text
Conference or Workshop Item -
109
-
110
Optimal Bounded-Collusion Secure Functional Encryption
Published 2021“…It is known that bounded-key functional encryption schemes with encryption complexity growing with ε > 0, for any constant Q1-λ, implies indistinguishability obfuscation. On the other hand, in the public-key setting, it was previously unknown whether we could achieve encryption complexity growing linear with Q, also known as optimal bounded-key FE, based on well-studied assumptions. …”
Get full text
Book -
111
From Selective to Adaptive Security in Functional Encryption
Published 2021“…The handful of known adaptively-secure schemes are based on specifically tailored techniques that rely on strong assumptions (such as obfuscation or multilinear maps assumptions) can be transformed into an adaptively-secure one without introducing any additional assumptions. …”
Get full text
Article -
112
Design automation for camouflage circuits
Published 2020“…There are various methods available to defend against these attacks, such as integrated circuit (IC) camouflaging, design obfuscation, split manufacturing, but the method adopted in the project is to camouflage the logic gates in the digital logic circuit. …”
Get full text
Final Year Project (FYP) -
113
Machine-learning attacks on PolyPUFs, OB-PUFs, RPUFs, LHS-PUFs, and PUF–FSMs
Published 2020“…The common flaw of all five designs is that the use of lightweight obfuscation logic provides insufficient protection against machine-learning attacks.…”
Get full text
Journal Article -
114
On hybrid network coding for visual traffic surveillance
Published 2021“…We argue that network coding can be applied to leverage on an emerging fog architecture that relies on edge resources, to achieve higher throughput, saving up network bandwidth, and provide resilience to link failures, while also achieving simple obfuscation against wire-tapping attacks by linearly combining the source packets. …”
Get full text
Journal Article -
115
Swarm intelligence for protecting sensitive identities in complex networks
Published 2024“…A novel fitness function based on structure entropy is proposed to promote the obfuscation of community structure, thereby hiding the membership of sensitive entities in networks. …”
Get full text
Journal Article -
116
A survey on current malicious javascript behavior of infected web content in detection of malicious web pages
Published 2020“…However, the efficient detection of malicious web pages previously has generated many false alarm by the use of sophisticated obfuscation techniques in benign JavaScript code in web pages. …”
Get full text
Conference or Workshop Item -
117
Watermarking Cryptographic Capabilities
Published 2020“…ACM, 59 (2012), 6] shows that, assuming indistinguishability obfuscation (iO), such watermarking is impossible if the marked program C evaluates the original program with perfect correctness. …”
Get full text
Article -
118
Multikey Fully Homomorphic Encryption and Applications
Published 2021“…This notion is qualitatively the best possible in minimizing interaction, since the users' interaction in the decryption stage is inevitable: we show that removing it would imply generic program obfuscation and is thus impossible. Our contributions are two-fold: (1) We define the new notion of multikey FHE, an enhanced FHE system which is capable of operating on inputs encrypted under multiple, unrelated keys. …”
Get full text
Article -
119
Rate-1 non-interactive arguments for batch-NP
Published 2022“…Prior to this work, IVC schemes were only known for P under a bilinear map assumption, and beyond P only under non-standard knowledge assumptions or in the random oracle model; multi-hop BARGs were only known under non-standard knowledge assumptions or in the random oracle model; and aggregate signatures were only known under indistinguishability obfuscation (and RSA) or in the random oracle model.…”
Get full text
Thesis -
120
Essays in System Dynamics for Operations Management: Policy, Platforms and Pricing
Published 2024“…Chapter 3 studies the effects of a common price obfuscation tactic, namely the use of shrouded hidden fees on consumer behavior and platform firm performance. …”
Get full text
Thesis