Obfuscation

Results: 1117



#Item
11Obfuscation-Resilient Privacy Leak Detection for Mobile Apps Through Differential Analysis Andrea Continella∗† , Yanick Fratantonio† , Martina Lindorfer† , Alessandro Puccetti† , Ali Zand† , Christopher Krueg

Obfuscation-Resilient Privacy Leak Detection for Mobile Apps Through Differential Analysis Andrea Continella∗† , Yanick Fratantonio† , Martina Lindorfer† , Alessandro Puccetti† , Ali Zand† , Christopher Krueg

Add to Reading List

Source URL: www.s3.eurecom.fr

Language: English - Date: 2017-11-07 11:46:31
    12SkypeMorph: Protocol Obfuscation for Tor Bridges Hooman Mohajeri Moghaddam Baiyu Li Mohammad Derakhshani Ian Goldberg Cheriton School of Computer Science

    SkypeMorph: Protocol Obfuscation for Tor Bridges Hooman Mohajeri Moghaddam Baiyu Li Mohammad Derakhshani Ian Goldberg Cheriton School of Computer Science

    Add to Reading List

    Source URL: cacr.uwaterloo.ca

    Language: English - Date: 2012-10-25 09:16:35
      13Engineering Code Obfuscation ISSISPTamperproofing Christian Collberg Department of Computer Science University of Arizona

      Engineering Code Obfuscation ISSISPTamperproofing Christian Collberg Department of Computer Science University of Arizona

      Add to Reading List

      Source URL: issisp2017.github.io

      Language: English - Date: 2017-07-26 05:14:50
        14Program Obfuscation: A Quantitative Approach Bertrand Anckaert, Matias Madou, Bjorn De Sutter, Bruno De Bus and Koen De Bosschere  Bart Preneel

        Program Obfuscation: A Quantitative Approach Bertrand Anckaert, Matias Madou, Bjorn De Sutter, Bruno De Bus and Koen De Bosschere Bart Preneel

        Add to Reading List

        Source URL: users.elis.ugent.be

        Language: English - Date: 2009-07-09 10:01:28
          15Engineering Code Obfuscation ISSISPObfuscation I Christian Collberg Department of Computer Science University of Arizona

          Engineering Code Obfuscation ISSISPObfuscation I Christian Collberg Department of Computer Science University of Arizona

          Add to Reading List

          Source URL: issisp2017.github.io

          - Date: 2017-07-26 05:14:50
            16Obfuscation ⇒ (IND-CPA Security 6⇒ Circular Security) Antonio Marcedone1,? and Claudio Orlandi2 1  Scuola Superiore di Catania, University of Catania, Italy,

            Obfuscation ⇒ (IND-CPA Security 6⇒ Circular Security) Antonio Marcedone1,? and Claudio Orlandi2 1 Scuola Superiore di Catania, University of Catania, Italy,

            Add to Reading List

            Source URL: eprint.iacr.org

            - Date: 2014-05-02 08:12:55
              17Lower Bounds on Assumptions behind Indistinguishability Obfuscation Mohammad Mahmoody1,? , Ameer Mohammed1,?? , Soheil Nematihaji1,? ? ? , Rafael Pass2,† , and abhi shelat1,‡ 1

              Lower Bounds on Assumptions behind Indistinguishability Obfuscation Mohammad Mahmoody1,? , Ameer Mohammed1,?? , Soheil Nematihaji1,? ? ? , Rafael Pass2,† , and abhi shelat1,‡ 1

              Add to Reading List

              Source URL: eprint.iacr.org

              - Date: 2015-10-31 12:23:22
                18Indistinguishability Obfuscation: from Approximate to Exact∗ Nir Bitansky† Vinod Vaikuntanathan‡  Abstract

                Indistinguishability Obfuscation: from Approximate to Exact∗ Nir Bitansky† Vinod Vaikuntanathan‡ Abstract

                Add to Reading List

                Source URL: eprint.iacr.org

                - Date: 2015-11-23 21:26:23
                  19Multilinear Maps from Obfuscation Martin R. Albrecht (RHUL) Pooya Farshim (QUB) Dennis Hofheinz (RHUL) Enrique Larraia (RHUL) Kenneth G. Paterson (RHUL)

                  Multilinear Maps from Obfuscation Martin R. Albrecht (RHUL) Pooya Farshim (QUB) Dennis Hofheinz (RHUL) Enrique Larraia (RHUL) Kenneth G. Paterson (RHUL)

                  Add to Reading List

                  Source URL: eprint.iacr.org

                  - Date: 2015-11-27 08:29:15