Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
obfuscation
biblio
Sequence Obfuscation to Thwart Pattern Matching Attacks
Submitted by grigby1 on Thu, 05/13/2021 - 12:10pm
anonymization
anonymous messaging
information-theoretic privacy
Internet of Things (IoT)
obfuscation
Privacy Preserving Mechanism (PPM)
pubcrawl
resilience
Resiliency
statistical matching
superstring
biblio
Optimizing Away JavaScript Obfuscation
Submitted by grigby1 on Wed, 05/05/2021 - 12:43pm
Open Source Software
tools
static analysis
Safe Coding
Resiliency
resilience
pubcrawl
policy-based governance
Payloads
collaboration
obfuscation
Metrics
Manuals
malware
JavaScript
internet
Human Factors
Human behavior
biblio
Mystic: Mystifying IP Cores Using an Always-ON FSM Obfuscation Method
Submitted by aekwall on Mon, 11/09/2020 - 1:32pm
integrated circuit industry
IP piracy
application specific integrated circuits
ASIC technology
circuit complexity
combinational circuits
finite state machine
FSM obfuscation method
hardware obfuscation method
Hardware Security
IP overproduction
ITC99 circuit benchmarks
logic encryption
Logic masking
Mystic obfuscation approach
Mystic protection method
mystifying IP cores
Logic gates
Hardware
Resiliency
pubcrawl
composability
policy-based governance
Production
Complexity theory
microprocessor chips
IP networks
obfuscation
reverse engineering
encoding
finite state machines
logic circuits
logic design
size 45.0 nm
biblio
Obfuscatable Anonymous Authentication Scheme for Mobile Crowd Sensing
Submitted by grigby1 on Fri, 09/04/2020 - 4:17pm
pubcrawl
mobile crowd sensing
mobile crowd sensing (MCS)
mobile devices
obfuscatable anonymous authentication scheme
obfuscation
privacy
privacy concerns
private authentication key
mobile computing
resilience
Resiliency
sensed data
sensor fusion
sensors
smart phones
special anonymous authentication scheme
anonymous authentication
Mobile Application
Metrics
MCS
insider attacks
information collection
encryption
device capture attacks
Cryptographic Protocols
composability
black box encryption
Batch verification
authentication requests
authentication request algorithm
authentication
anonymous authentication schemes
biblio
Healthcare IoT: Benefits, vulnerabilities and solutions
Submitted by aekwall on Mon, 07/20/2020 - 10:55am
medical data
white box cryptography
security defense
security
reverse engineering
return oriented programming techniques
Resiliency
pubcrawl
obfuscation technique
obfuscation
Monitoring
Mobile Applications
Metrics
Medical services
Medical diagnostic imaging
Access Control
medical computing
Internet of Things
implantable medical devices
implantable health gadgets
healthcare IoT system
healthcare IoT
health care
data privacy
Cryptography
Computer crime
composability
Biomedical monitoring
authorisation
biblio
[Research Paper] Combining Obfuscation and Optimizations in the Real World
Submitted by aekwall on Mon, 07/20/2020 - 10:55am
Code Obfuscation
white box cryptography
white-box encryption calls
tool-specific countermeasures
sequential pass management techniques
scheduling code transformations
rewriting systems
reverse engineer
pass scheduling problem
pass ordering
pass combinations
multicriteria optimization problem
Job shop scheduling
industrial-strength obfuscator
code tangling techniques
code obfuscator
Cryptography
program compilers
reverse engineering
Virtualization
scheduling
obfuscation
Heuristic algorithms
optimisation
tools
optimization
Metrics
composability
pubcrawl
Resiliency
Kernel
biblio
The Anti-Data-Mining (ADM) Framework - Better Privacy on Online Social Networks and Beyond
Submitted by aekwall on Mon, 07/13/2020 - 11:06am
New Paradigms for Privacy
big data security
Cloud Privacy
data centers
deception
eavesdropping governments
enhanced privacy
enormous growth
Financial Terminal Privacy
financial terminal providers
Financial Terminal Security
Future of Privacy
information accumulators
big data privacy
Obfuscation for Privacy
Privacy against Ad Networks
Privacy against timing attacks
Search Engine Privacy
sensitive data suppression
social network
social-bots
unprecedented growth
user privacy
users privacy
user privacy in the cloud
obfuscation
Big Data
data privacy
security
Resiliency
pubcrawl
privacy
Facebook
online social networks
social networking (online)
Metrics
Data mining
Scalability
Cloud Computing
Cloud Security
search engines
disinformation
ADM
Adversarial Face Detection
Adversarial Face Recognition
Adversarial Machine Learning
adversaries
Advertising Privacy
Anti-Data-Mining
anti-data-mining principle
biblio
Adversarial Authorship Attribution in Open-Source Projects
Submitted by grigby1 on Mon, 01/27/2020 - 12:29pm
adversarial
attacks
authorship attribution
Human behavior
Human Factors
imitation
Metrics
obfuscation
open-source software
pubcrawl
stylometry
biblio
Lightweight, Obfuscation-Resilient Detection and Family Identification of Android Malware
Submitted by grigby1 on Wed, 10/02/2019 - 2:56pm
Android malware
Lightweight
machine learning
native code
obfuscation
pubcrawl
reflection
resilience
Resiliency
biblio
DoSE: Deobfuscation Based on Semantic Equivalence
Submitted by grigby1 on Mon, 08/05/2019 - 11:35am
code cloning
collaboration
control-flow graph
deobfuscation
false trust
Malware Analysis
obfuscation
opaque predicate
policy-based governance
pubcrawl
resilience
Resiliency
reverse engineering
Scalability
Symbolic Execution
« first
‹ previous
1
2
3
4
next ›
last »