37 papers:
DAC-2015-GuoTFD #anti #obfuscation #reverse engineering- Investigation of obfuscation-based anti-reverse engineering for printed circuit boards (ZG, MT, DF, JD), p. 6.
DATE-2015-KainthKNVT #obfuscation- Hardware-assisted code obfuscation for FPGA soft microprocessors (MK, LK, CN, SGV, RT), pp. 127–132.
ICPC-2015-AvidanF #comprehension #obfuscation- From obfuscation to comprehension (EA, DGF), pp. 178–181.
SCAM-2015-BlazyRS #obfuscation- Data tainting and obfuscation: Improving plausibility of incorrect taint (SB, SR, TS), pp. 111–120.
STOC-2015-CanettiH0V #obfuscation #ram #source code- Succinct Garbling and Indistinguishability Obfuscation for RAM Programs (RC, JH, AJ, VV), pp. 429–437.
STOC-2015-KoppulaLW #bound #memory management #obfuscation #turing machine- Indistinguishability Obfuscation for Turing Machines with Unbounded Memory (VK, ABL, BW), pp. 419–428.
DATE-2014-LiuW #configuration management #design #embedded #logic #obfuscation- Embedded reconfigurable logic for ASIC design obfuscation against supply chain attacks (BL, BW), pp. 1–6.
ICPC-2014-KulkarniM #framework #obfuscation #using- A code obfuscation framework using code clones (AK, RM), pp. 295–299.
ICSME-2014-SahinTMPC #energy #how #obfuscation #question- How Does Code Obfuscation Impact Energy Usage? (CS, PT, RM, ZP, JC), pp. 131–140.
MSR-2014-VasquezHBP #android #library #obfuscation #reuse- Revisiting Android reuse studies in the context of code obfuscation and library usages (MLV, AH, CBC, DP), pp. 242–251.
STOC-2014-SahaiW #encryption #how #obfuscation- How to use indistinguishability obfuscation: deniable encryption, and more (AS, BW), pp. 475–484.
FSE-2014-LuoMW0Z #comparison #detection #obfuscation #semantics #similarity- Semantics-based obfuscation-resilient binary code similarity comparison with applications to software plagiarism detection (LL, JM, DW, PL, SZ), pp. 389–400.
STOC-2013-BitanskyP #approximate #encryption #obfuscation #on the- On the impossibility of approximate obfuscation and applications to resettable cryptography (NB, OP), pp. 241–250.
DAC-2012-RajendranPSK #analysis #logic #obfuscation #security- Security analysis of logic obfuscation (JR, YP, OS, RK), pp. 83–89.
VLDB-2012-BoldiBGT #graph #injection #nondeterminism #obfuscation- Injecting Uncertainty in Graphs for Identity Obfuscation (PB, FB, AG, TT), pp. 1376–1387.
SCAM-2012-Zambon #bytecode #java #obfuscation- Aucsmith-Like Obfuscation of Java Bytecode (AZ), pp. 114–119.
WCRE-2012-CapiluppiFB #effectiveness #java #obfuscation- Code Defactoring: Evaluating the Effectiveness of Java Obfuscations (AC, PF, CB), pp. 71–80.
WCRE-2012-Kinder #obfuscation #static analysis #towards- Towards Static Analysis of Virtualization-Obfuscated Binaries (JK), pp. 61–70.
PEPM-2012-GiacobazziJM #obfuscation #partial evaluation- Obfuscation by partial evaluation of distorted interpreters (RG, NDJ, IM), pp. 63–72.
SAS-2012-GiacobazziM #abstract interpretation #modelling #obfuscation- Making Abstract Interpretation Incomplete: Modeling the Potency of Obfuscation (RG, IM), pp. 129–145.
RecSys-2012-WeinsbergBIT #gender #named #obfuscation- BlurMe: inferring and obfuscating user gender based on ratings (UW, SB, SI, NT), pp. 195–202.
PEPM-2010-LakhotiaBSM #analysis #bytecode #obfuscation- Context-sensitive analysis of obfuscated x86 executables (AL, DRB, AS, AM), pp. 131–140.
ICPC-2009-CeccatoPNFRTT #assessment #effectiveness #obfuscation #source code- The effectiveness of source code obfuscation: An experimental assessment (MC, MDP, JN, PF, FR, MT, PT), pp. 178–187.
SAS-2009-DrapeV #matrix #obfuscation- Creating Transformations for Matrix Obfuscation (SD, IV), pp. 273–292.
RecSys-2009-ChengH #effectiveness #modelling #obfuscation #recommendation- Effective diverse and obfuscated attacks on model-based recommender systems (ZC, NH), pp. 141–148.
SEFM-2008-Giacobazzi08a #obfuscation- Hiding Information in Completeness Holes: New Perspectives in Code Obfuscation and Watermarking (RG), pp. 7–18.
ICPC-2007-NaeemBH #effectiveness #metric #obfuscation- Metrics for Measuring the Effectiveness of Decompilers and Obfuscators (NAN, MB, LJH), pp. 253–258.
WCRE-2007-RaberL07a #approach #automation #identification #named #obfuscation- Deobfuscator: An Automated Approach to the Identification and Removal of Code Obfuscation (JR, EL), pp. 275–276.
CC-2007-BatchelderH #java #obfuscation- Obfuscating Java: The Most Pain for the Least Gain (MB, LJH), pp. 96–110.
ICPC-2006-MadouPB #comprehension #obfuscation- Understanding Obfuscated Code (MM, LVP, KDB), pp. 268–274.
PEPM-2006-MadouPB #interactive #named #obfuscation- LOCO: an interactive code (De)obfuscation tool (MM, LVP, KDB), pp. 140–144.
ECIR-2006-FreschiSB #email #obfuscation #string- Filtering Obfuscated Email Spam by means of Phonetic String Matching (VF, AS, AB), pp. 505–509.
WCRE-2005-UdupaDM #named #obfuscation #reverse engineering- Deobfuscation: Reverse Engineering Obfuscated Code (SKU, SKD, MM), pp. 45–54.
STOC-2005-Wee #obfuscation #on the- On obfuscating point functions (HW), pp. 523–532.
ICALP-2005-PredaG #abstract interpretation #obfuscation #semantics- Semantic-Based Code Obfuscation by Abstract Interpretation (MDP, RG), pp. 1325–1336.
SEFM-2005-PredaG #abstract interpretation #obfuscation- Control Code Obfuscation by Abstract Interpretation (MDP, RG), pp. 301–310.
SCAM-2004-LakhotiaK #detection #obfuscation #stack- Abstracting Stack to Detect Obfuscated Calls in Binaries (AL, EUK), pp. 17–26.