Raze to the ground: Query-efficient adversarial html attacks on machine-learning phishing webpage detectors

B Montaruli, L Demetrio, M Pintor… - Proceedings of the 16th …, 2023 - dl.acm.org
Machine-learning phishing webpage detectors (ML-PWD) have been shown to suffer from
adversarial manipulations of the HTML code of the input webpage. Nevertheless, the attacks …

Security and privacy in cloud computing via obfuscation and diversification: A survey

S Hosseinzadeh, S Hyrynsalmi, M Conti… - 2015 IEEE 7th …, 2015 - ieeexplore.ieee.org
The development of cloud computing has facilitate the organizations with its services. This
makes the security and privacy of the cloud even more significant. Diversification and …

[PDF][PDF] The Insufficiency of Formal Design Methods-the necessity of an experimental approach for the understanding and control of complex MAS

B Edmonds, JJ Bryson - Proceedings of the Third International Joint …, 2004 - academia.edu
We highlight the limitations of formal methods by exhibiting two results in recursive function
theory: that there is no effective means of finding a program that satisfies a given formal …

A tool for teaching reverse engineering

C Taylor, C Colberg - 2016 USENIX Workshop on Advances in Security …, 2016 - usenix.org
Tigress is a freely available source-to-source, C language code obfuscator. The tool allows
users to obfuscate existing programs or programs randomly generated by Tigress itself …

Evaluation methodologies in software protection research

B De Sutter, S Schrittwieser, B Coppens… - arxiv preprint arxiv …, 2023 - arxiv.org
Man-at-the-end (MATE) attackers have full control over the system on which the attacked
software runs, and try to break the confidentiality or integrity of assets embedded in the …

Obfuscating LLVM intermediate representation source code with NSGA-II

JC Torre, JM Aragón-Jurado, J Jareño… - … Intelligence in Security …, 2022 - Springer
With the generalisation of distributed computing paradigms to sustain the surging demands
for massive processing and data-analytic capabilities, the protection of the intellectual …

Task allocation and migration algorithm for temperature-constrained real-time multi-core systems

G Wu, Z Xu, Q **a, J Ren, F **a - … IEEE/ACM Int'l Conference on …, 2010 - ieeexplore.ieee.org
Temperature rise will affect the stability and performance of multi-core processors. A
temperature-aware task scheduling algorithm for real-time multi-core systems, called LTEDF …

Source code obfuscation with genetic algorithms using LLVM code optimizations

JC de la Torre, J Jareño… - Logic Journal of the …, 2024 - academic.oup.com
With the advent of the cloud computing model allowing a shared access to massive
computing facilities, a surging demand emerges for the protection of the intellectual property …

Two-Level Software Obfuscation with Cooperative Co-Evolutionary Algorithms

JM Aragón-Jurado, J Jareóo… - 2024 IEEE Congress …, 2024 - ieeexplore.ieee.org
Computing devices are ubiquitous nowadays and because of the rise of new paradigms as
the Internet of Things, their presence is continuously growing. Software (SW) is highly …

Comparison of multi-objective optimization algorithms for the jshadobf javascript obfuscator

B Bertholon, S Varrette, P Bouvry - 2014 IEEE International …, 2014 - ieeexplore.ieee.org
With the advent of the Cloud Computing (CC) paradigm and the explosion of new Web
Services proposed over the Internet (such as Google Office Apps, Dropbox or Doodle), the …