Sciweavers

112 search results - page 4 / 23
» Securely Obfuscating Re-encryption
Sort
View
CCS
2010
ACM
14 years 10 months ago
Mimimorphism: a new approach to binary code obfuscation
Zhenyu Wu, Steven Gianvecchio, Mengjun Xie, Hainin...
WCRE
2005
IEEE
15 years 3 months ago
Deobfuscation: Reverse Engineering Obfuscated Code
In recent years, code obfuscation has attracted attention as a low cost approach to improving software security by making it difficult for attackers to understand the inner worki...
Sharath K. Udupa, Saumya K. Debray, Matias Madou
ACSC
2006
IEEE
15 years 3 months ago
Manufacturing opaque predicates in distributed systems for code obfuscation
Code obfuscation is a relatively new technique of software protection and it works by deterring reverse engineering attempts by malicious users of software. The objective of obfus...
Anirban Majumdar, Clark D. Thomborson
ASIACRYPT
2000
Springer
15 years 2 months ago
Zero-Knowledge and Code Obfuscation
In this paper, we investigate the gap between auxiliary-input zero-knowledge (AIZK) and blackbox-simulation zero-knowledge (BSZK). It is an interesting open problem whether or not ...
Satoshi Hada
DRM
2003
Springer
15 years 3 months ago
Obfuscation of design intent in object-oriented applications
Protection of digital data from unauthorized access is of paramount importance. In the past several years, much research has concentrated on protecting data from the standpoint of...
Mikhail Sosonkin, Gleb Naumovich, Nasir D. Memon