Obfuscation
20 Followers
Recent papers in Obfuscation
Automated Fingerprint Identification Systems (AFIS) is deployed in law authorization and fringe control applications. This has elevated the requirement for guaranteeing that these frameworks are not traded off. A few issues identified... more
Imagine there is certain content we want to maintain private until some particular event occurs, when we want to have it automatically disclosed. Suppose furthermore, that we want this done in a (possibly) malicious host. Say, the... more
Title of Thesis: SECURITY THROUGH OBSCURITY: LAYOUT OBFUSCATION OF DIGITAL INTEGRATED CIRCUITS USING DON’T CARE CONDITIONS Sana Mehmood Awan, Master of Science, 2015 Directed By: Professor Gang Qu, Department of Electrical and Computer... more
Abstract. There are many programming situations where it would be convenient to conceal the meaning of code, or the meaning of certain variables. This can be achieved through program transformations which are grouped under the term... more
As location-based services emerge, many people feel exposed to high privacy threats. Privacy protection is a major challenge for such applications. A broadly used approach is perturbation, which adds an artificial noise to positions and... more
Whether we accept it or not, computer systems and the op-erating systems that direct them are at the heart of major forms of malicious activity. Criminals can use computers as the actual target of their malicious activity (stealing funds... more
Zimbabwe " s pro-democracy groups have alleged significant information security breaches of voters " personal data ahead of the Monday 30 July elections. While there haven " t been any reported significant network disruptions so far,... more
A new approach to software metrics using concepts from information theory, data compression, complexity theory and analogies with real physical systems is described. A novel application of software obfuscation allows an existing software... more
In this paper, we propose an obfuscation/ deobfuscation based technique to detect the presence of possible SQL Injection Attacks (SQLIA) in a query before submitting it to a DBMS. This technique combines static and dynamic analysis. In... more