Obfuscation

Results: 1117



#Item
351

Control Flow Obfuscation using Neural Network to Fight Concolic Testing? Haoyu Ma1 , Xinjie Ma1 , Weijie Liu1 , Zhipeng Huang1 , Debin Gao2 , and Chunfu Jia1 1

Add to Reading List

Source URL: flyer.sis.smu.edu.sg

Language: English - Date: 2015-01-04 20:08:52
    352Cryptography / Computer access control / Obfuscation / Password / Security / Salt / Crypt / Password strength / Password cracking

    PKC 2015 – March 31st Two-Server Password-Authenticated Secret Sharing UC-Secure Against Transient Corruptions Jan Camenisch, Robert R. Enderlein, Gregory Neven

    Add to Reading List

    Source URL: www.e7n.ch

    Language: English
    353Graph theory / Graph / Degree / Clique / Ear decomposition / Vertex / Connectivity / Line graph / Planar separator theorem

    Injecting Uncertainty in Graphs for Identity Obfuscation Paolo Boldi Francesco Bonchi Aristides Gionis Tamir Tassa Universita` degli Studi Milano, Italy Yahoo! Research

    Add to Reading List

    Source URL: vldb.org

    Language: English - Date: 2012-07-27 13:07:38
    354Obfuscation / Table of bases / Index of Abkhazia-related articles

    PDF Document

    Add to Reading List

    Source URL: serfox-soft.narod.ru

    Language: English - Date: 2013-04-03 05:13:34
    355Obfuscation / Computer programming / Index of standards articles / Standards / Index of Abkhazia-related articles

    Approved for Release: /~ 1 C06238943__ C06238943 ··; ~ .

    Add to Reading List

    Source URL: www.ciasavedlives.com

    Language: English - Date: 2015-01-02 12:32:53
    356

    Operating System Interface Obfuscation and the Revealing of Hidden Operations Abhinav Srivastava1 Andrea Lanzi1,2

    Add to Reading List

    Source URL: www.iseclab.org

    Language: English
      357Obfuscation / Index of Abkhazia-related articles / Toledo Nanochess

      PDF Document

      Add to Reading List

      Source URL: www.carolgordonekster.com

      Language: English - Date: 2015-12-26 19:08:39
      358

      Impeding Malware Analysis Using Conditional Code Obfuscation Monirul Sharif1 1 Andrea Lanzi2

      Add to Reading List

      Source URL: www.iseclab.org

      Language: English
        359

        --------------------------------------------------Advisory: Google Chrome MetaCharacter URI Obfuscation Vulnerability. Version Affected: ChromeChromeChrome

        Add to Reading List

        Source URL: www.evilfingers.com

        Language: English - Date: 2008-11-24 12:18:38
          360Obfuscated code / Obfuscation / Source code

          PDF Document

          Add to Reading List

          Source URL: www.nicee.org

          Language: English - Date: 2006-03-20 01:13:35
          UPDATE