Tag #obfuscation
55 papers:
ASPLOS-2020-ZhangSYZS0 #execution #named #performance- Klotski: Efficient Obfuscated Execution against Controlled-Channel Attacks (PZ, CS, HY, DZ, ES, HJ0), pp. 1263–1276.
SANER-2019-PizzolottoFC #android #java #named #source code- OBLIVE: Seamless Code Obfuscation for Java Programs and Android Apps (DP, RF, MC), pp. 629–633.
ICML-2019-BertranMPQRRS - Adversarially Learned Representations for Information Obfuscation and Inference (MB, NM, AP, QQ, MRDR, GR, GS), pp. 614–623.
PEPM-2019-Lu #continuation #control flow- Control flow obfuscation via CPS transformation (KZML), pp. 54–60.
SCAM-2018-GueltonGBCDS #optimisation #research- [Research Paper] Combining Obfuscation and Optimizations in the Real World (SG, AG, PB, JMMC, FD, NS), pp. 24–33.
SCAM-2018-PizzolottoC #bytecode #java #library #research #source code- [Research Paper] Obfuscating Java Programs by Translating Selected Portions of Bytecode to Native Libraries (DP, MC), pp. 40–49.
ICML-2018-AthalyeC0 #security- Obfuscated Gradients Give a False Sense of Security: Circumventing Defenses to Adversarial Examples (AA, NC, DAW0), pp. 274–283.
- ICSE-2018-GarciaHM #android #detection #identification #lightweight #product line
- Lightweight, obfuscation-resilient detection and family identification of Android malware (JG, MH, SM), p. 497.
- ICSE-2018-HammadGM #android #anti #empirical #scalability
- A large-scale empirical study on the effects of code obfuscations on Android apps and anti-malware products (MH, JG, SM), pp. 421–431.
- ICSE-2018-WangBWWCWW #empirical #mobile #scalability
- Software protection on the go: a large-scale empirical study on mobile app obfuscation (PW0, QB, LW, SW0, ZC, TW, DW), pp. 26–36.
VMCAI-2018-BruniGG #model checking- Code Obfuscation Against Abstract Model Checking Attacks (RB, RG, RG), pp. 94–115.
SANER-2017-TiellaC #automation #clique #generative #problem- Automatic generation of opaque constants based on the k-clique problem for resilient data obfuscation (RT, MC), pp. 182–192.
ECIR-2017-AlviSC #detection- Plagiarism Detection in Texts Obfuscated with Homoglyphs (FA, MS, PDC), pp. 669–675.
ESEC-FSE-2017-GlanzAERHLM #named- CodeMatch: obfuscation won't conceal your repackaged app (LG, SA, ME, MR, BH, JL, MM), pp. 638–648.
ESEC-FSE-2017-VasilescuCD #identifier- Recovering clear, natural identifiers from obfuscated JS names (BV, CC, PTD), pp. 683–693.
- ICSE-2017-LiuSSJGS #optimisation #probability
- Stochastic optimization of program obfuscation (HL0, CS, ZS, YJ0, MG0, JS), pp. 221–231.
SCAM-2016-ViticchieRTBCTT #assessment #source code- Assessment of Source Code Obfuscation Techniques (AV, LR, MT, CB, MC, PT, RT), pp. 11–20.
ASE-2016-QiJZWC #estimation #learning #privacy #subclass- Privacy preserving via interval covering based subclass division and manifold learning based bi-directional obfuscation for effort estimation (FQ, XYJ, XZ, FW, LC), pp. 75–86.
ICPC-2015-AvidanF #comprehension- From obfuscation to comprehension (EA, DGF), pp. 178–181.
SCAM-2015-BlazyRS - Data tainting and obfuscation: Improving plausibility of incorrect taint (SB, SR, TS), pp. 111–120.
DAC-2015-GuoTFD #anti #reverse engineering- Investigation of obfuscation-based anti-reverse engineering for printed circuit boards (ZG, MT, DF, JD), p. 6.
DATE-2015-KainthKNVT - Hardware-assisted code obfuscation for FPGA soft microprocessors (MK, LK, CN, SGV, RT), pp. 127–132.
STOC-2015-CanettiH0V #ram #source code- Succinct Garbling and Indistinguishability Obfuscation for RAM Programs (RC, JH, AJ, VV), pp. 429–437.
STOC-2015-KoppulaLW #bound #memory management #turing machine- Indistinguishability Obfuscation for Turing Machines with Unbounded Memory (VK, ABL, BW), pp. 419–428.
ICPC-2014-KulkarniM #framework #using- A code obfuscation framework using code clones (AK, RM), pp. 295–299.
ICSME-2014-SahinTMPC #energy #how #question- How Does Code Obfuscation Impact Energy Usage? (CS, PT, RM, ZP, JC), pp. 131–140.
MSR-2014-VasquezHBP #android #library #reuse- Revisiting Android reuse studies in the context of code obfuscation and library usages (MLV, AH, CBC, DP), pp. 242–251.
FSE-2014-LuoMW0Z #comparison #detection #semantics #similarity- Semantics-based obfuscation-resilient binary code similarity comparison with applications to software plagiarism detection (LL, JM, DW, PL, SZ), pp. 389–400.
DATE-2014-LiuW #configuration management #design #embedded #logic- Embedded reconfigurable logic for ASIC design obfuscation against supply chain attacks (BL, BW), pp. 1–6.
STOC-2014-SahaiW #encryption #how- How to use indistinguishability obfuscation: deniable encryption, and more (AS, BW), pp. 475–484.
STOC-2013-BitanskyP #approximate #encryption #on the- On the impossibility of approximate obfuscation and applications to resettable cryptography (NB, OP), pp. 241–250.
VLDB-2012-BoldiBGT #graph #injection #nondeterminism- Injecting Uncertainty in Graphs for Identity Obfuscation (PB, FB, AG, TT), pp. 1376–1387.
SCAM-2012-Zambon #bytecode #java- Aucsmith-Like Obfuscation of Java Bytecode (AZ), pp. 114–119.
WCRE-2012-CapiluppiFB #effectiveness #java- Code Defactoring: Evaluating the Effectiveness of Java Obfuscations (AC, PF, CB), pp. 71–80.
WCRE-2012-Kinder #static analysis #towards- Towards Static Analysis of Virtualization-Obfuscated Binaries (JK), pp. 61–70.
RecSys-2012-WeinsbergBIT #gender #named- BlurMe: inferring and obfuscating user gender based on ratings (UW, SB, SI, NT), pp. 195–202.
PEPM-2012-GiacobazziJM #partial evaluation- Obfuscation by partial evaluation of distorted interpreters (RG, NDJ, IM), pp. 63–72.
SAS-2012-GiacobazziM #abstract interpretation #modelling- Making Abstract Interpretation Incomplete: Modeling the Potency of Obfuscation (RG, IM), pp. 129–145.
DAC-2012-RajendranPSK #analysis #logic #security- Security analysis of logic obfuscation (JR, YP, OS, RK), pp. 83–89.
PEPM-2010-LakhotiaBSM #analysis #bytecode- Context-sensitive analysis of obfuscated x86 executables (AL, DRB, AS, AM), pp. 131–140.
ICPC-2009-CeccatoPNFRTT #assessment #effectiveness #source code- The effectiveness of source code obfuscation: An experimental assessment (MC, MDP, JN, PF, FR, MT, PT), pp. 178–187.
RecSys-2009-ChengH #effectiveness #modelling #recommendation- Effective diverse and obfuscated attacks on model-based recommender systems (ZC, NH), pp. 141–148.
SAS-2009-DrapeV #matrix- Creating Transformations for Matrix Obfuscation (SD, IV), pp. 273–292.
SEFM-2008-Giacobazzi08a - Hiding Information in Completeness Holes: New Perspectives in Code Obfuscation and Watermarking (RG), pp. 7–18.
ICPC-2007-NaeemBH #effectiveness #metric- Metrics for Measuring the Effectiveness of Decompilers and Obfuscators (NAN, MB, LJH), pp. 253–258.
WCRE-2007-RaberL07a #approach #automation #identification #named- Deobfuscator: An Automated Approach to the Identification and Removal of Code Obfuscation (JR, EL), pp. 275–276.
CC-2007-BatchelderH #java- Obfuscating Java: The Most Pain for the Least Gain (MB, LJH), pp. 96–110.
ICPC-2006-MadouPB #comprehension- Understanding Obfuscated Code (MM, LVP, KDB), pp. 268–274.
ECIR-2006-FreschiSB #email #string- Filtering Obfuscated Email Spam by means of Phonetic String Matching (VF, AS, AB), pp. 505–509.
PEPM-2006-MadouPB #interactive #named- LOCO: an interactive code (De)obfuscation tool (MM, LVP, KDB), pp. 140–144.
WCRE-2005-UdupaDM #named #reverse engineering- Deobfuscation: Reverse Engineering Obfuscated Code (SKU, SKD, MM), pp. 45–54.
ICALP-2005-PredaG #abstract interpretation #semantics- Semantic-Based Code Obfuscation by Abstract Interpretation (MDP, RG), pp. 1325–1336.
SEFM-2005-PredaG #abstract interpretation- Control Code Obfuscation by Abstract Interpretation (MDP, RG), pp. 301–310.
STOC-2005-Wee #on the- On obfuscating point functions (HW), pp. 523–532.
SCAM-2004-LakhotiaK #detection #stack- Abstracting Stack to Detect Obfuscated Calls in Binaries (AL, EUK), pp. 17–26.