Search

Your search keyword '"Obfuscation"' showing total 163 results

Search Constraints

Start Over You searched for: Descriptor "Obfuscation" Remove constraint Descriptor: "Obfuscation" Publisher acm Remove constraint Publisher: acm
163 results on '"Obfuscation"'

Search Results

1. POSTER: A Tough Nut to Crack: Attempting to Break Modulation Obfuscation

2. Human Attributes Prediction under Privacy-preserving Conditions

3. Identity-Preserving Face Anonymization via Adaptively Facial Attributes Obfuscation

4. Sentry-NoC

5. Opposing Data Exploitation: Behaviour Biometrics for Privacy-Preserving Authentication in IoT Environments

6. Wide-AdGraph: Detecting Ad Trackers with a Wide Dependency Chain Graph

7. Quantum Obfuscation

8. Computing with time: microarchitectural weird machines

9. RL-BIN++: Overcoming Binary Instrumentation Challenges in the Presence of Obfuscation Techniques and Problematic Features

10. Top-down Physical Design of Soft Embedded FPGA Fabrics

11. Characterising Proxy Usage in the Bitcoin Peer-to-Peer Network

12. Multifaceted Privacy

13. Adaptable and divergent synthetic benchmark generation for hardware security

14. Hiding in Plain Site

15. Single Secret Leader Election

16. Time-Efficient Geo-Obfuscation to Protect Worker Location Privacy over Road Networks in Spatial Crowdsourcing

17. Index Obfuscation for Oblivious Document Retrieval in a Trusted Execution Environment

18. VVSec

19. An empirical study on ARM disassembly tools

20. One-shot signatures and applications to hybrid quantum/classical authentication

21. DANdroid

22. My script engines know what you did in the dark

23. A General Framework for Privacy-preserving Computation on Cloud Environments

24. Cheat Protection in Online Games

25. Robust Detection of Obfuscated Strings in Android Apps

26. AdVersarial

27. Effective and Light-Weight Deobfuscation and Semantic-Aware Attack Detection for PowerShell Scripts

28. Obfuscation-Resilient Code Recognition in Android Apps

29. IoT Ignorance is Digital Forensics Research Bliss

30. Oblivious DNS

31. LibID: reliable identification of obfuscated third-party Android libraries

32. Flexibly and Securely Shape Your Data Disclosed to Others

33. Location Privacy in Heterogeneous Vehicular Networks

34. A Cellular Automata Guided Obfuscation Strategy For Finite-State-Machine Synthesis

35. Low-Overhead Power Trace Obfuscation for Smart Meter Privacy

36. Anything to Hide? Studying Minified and Obfuscated Code in the Web

37. Can Privacy Be Satisfying?

38. Secure and Trustworthy Cyber-Physical System Design

39. Adversarial Authorship Attribution in Open-Source Projects

40. ScanSAT

41. MemCloak

42. TimingSAT

43. Software protection on the go: a large-scale empirical study on mobile app obfuscation

44. How You Get Shot in the Back

45. VMHunt

46. Android authorship attribution through string analysis

47. Tackling Androids Native Library Malware with Robust, Efficient and Accurate Similarity Measures

48. A Unifying logic encryption security metric

49. TAO

50. Eliciting social biases in children using tangible games

Catalog

Books, media, physical & digital resources