Zobrazeno 1 - 10
of 6 878
pro vyhledávání: '"Obfuscation"'
Publikováno v:
Information & Computer Security, 2024, Vol. 32, Issue 4, pp. 420-435.
Externí odkaz:
http://www.emeraldinsight.com/doi/10.1108/ICS-11-2023-0206
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Publikováno v:
JuTISI (Jurnal Teknik Informatika dan Sistem Informasi), Vol 10, Iss 2, Pp 161-172 (2024)
Di era serba digital saat ini, data menjadi sebuah aset yang sangat berharga. Berbagai macam teknik digunakan untuk mencuri data pribadi yang berpotensi disalahgunakan oleh pihak yang tidak bertanggung jawab. Objek yang digunakan pada penelitian ini
Externí odkaz:
https://doaj.org/article/b4a3817d37b343d49e58f0563c4f86b9
Publikováno v:
网络与信息安全学报, Vol 10, Pp 143-153 (2024)
The proliferation of artificial intelligence models has rendered them vulnerable to a myriad of security threats. The extensive integration of deep learning models into edge devices has introduced novel security challenges. Given the analogous struct
Externí odkaz:
https://doaj.org/article/93e9a1a5aa754e818bbec87c7ae25edb
Publikováno v:
网络与信息安全学报, Vol 10, Iss 2, Pp 143-153 (2024)
The proliferation of artificial intelligence models has rendered them vulnerable to a myriad of security threats. The extensive integration of deep learning models into edge devices has introduced novel security challenges. Given the analogous struct
Externí odkaz:
https://doaj.org/article/3a78edc698954304bbd96920b993f5b1
Publikováno v:
BenchCouncil Transactions on Benchmarks, Standards and Evaluations, Vol 4, Iss 2, Pp 100163- (2024)
The binary code similarity detection (BCSD) technique can quantitatively measure the differences between two given binaries and give matching results at predefined granularity (e.g., function), and has been widely used in multiple scenarios including
Externí odkaz:
https://doaj.org/article/e2202087f64a4592a97c3a1cbcc070ca
Publikováno v:
Xibei Gongye Daxue Xuebao, Vol 42, Iss 1, Pp 78-83 (2024)
Logical obfuscation technique is a mainstream technical means to achieve intellectual property protection and prevent reverse engineering. In this paper, we propose a logical obfuscation attack method based on the gate-level information flow tracking
Externí odkaz:
https://doaj.org/article/611ca29e02194d288dad8f828dd90bb5
Autor:
Emre Aydogan, Sevil Sen
Publikováno v:
IEEE Access, Vol 12, Pp 6569-6589 (2024)
With the widespread use of mobile devices, Android has become the most popular operating system, and new applications being uploaded to the Android market every day. However, due to the ease of modifying and repackaging Android binaries, Android appl
Externí odkaz:
https://doaj.org/article/9c4a08b0b8384337bd4b78041a0f8cb2
Publikováno v:
IEEE Access, Vol 12, Pp 17481-17498 (2024)
Malware targeting user privacy has seen a surge in recent times, attributed to evolving global regulations and the boost of electronic commerce and online services. Moreover, recognizing privacy malware that employs obfuscation as evasion mechanism p
Externí odkaz:
https://doaj.org/article/c24b56fd41174e6989768599ffc0e42b