Raze to the ground: Query-efficient adversarial html attacks on machine-learning phishing webpage detectors
Machine-learning phishing webpage detectors (ML-PWD) have been shown to suffer from
adversarial manipulations of the HTML code of the input webpage. Nevertheless, the attacks …
adversarial manipulations of the HTML code of the input webpage. Nevertheless, the attacks …
Security and privacy in cloud computing via obfuscation and diversification: A survey
The development of cloud computing has facilitate the organizations with its services. This
makes the security and privacy of the cloud even more significant. Diversification and …
makes the security and privacy of the cloud even more significant. Diversification and …
[PDF][PDF] The Insufficiency of Formal Design Methods-the necessity of an experimental approach for the understanding and control of complex MAS
We highlight the limitations of formal methods by exhibiting two results in recursive function
theory: that there is no effective means of finding a program that satisfies a given formal …
theory: that there is no effective means of finding a program that satisfies a given formal …
A tool for teaching reverse engineering
C Taylor, C Colberg - 2016 USENIX Workshop on Advances in Security …, 2016 - usenix.org
Tigress is a freely available source-to-source, C language code obfuscator. The tool allows
users to obfuscate existing programs or programs randomly generated by Tigress itself …
users to obfuscate existing programs or programs randomly generated by Tigress itself …
Evaluation methodologies in software protection research
Man-at-the-end (MATE) attackers have full control over the system on which the attacked
software runs, and try to break the confidentiality or integrity of assets embedded in the …
software runs, and try to break the confidentiality or integrity of assets embedded in the …
Obfuscating LLVM intermediate representation source code with NSGA-II
With the generalisation of distributed computing paradigms to sustain the surging demands
for massive processing and data-analytic capabilities, the protection of the intellectual …
for massive processing and data-analytic capabilities, the protection of the intellectual …
Task allocation and migration algorithm for temperature-constrained real-time multi-core systems
Temperature rise will affect the stability and performance of multi-core processors. A
temperature-aware task scheduling algorithm for real-time multi-core systems, called LTEDF …
temperature-aware task scheduling algorithm for real-time multi-core systems, called LTEDF …
Source code obfuscation with genetic algorithms using LLVM code optimizations
JC de la Torre, J Jareño… - Logic Journal of the …, 2024 - academic.oup.com
With the advent of the cloud computing model allowing a shared access to massive
computing facilities, a surging demand emerges for the protection of the intellectual property …
computing facilities, a surging demand emerges for the protection of the intellectual property …
Two-Level Software Obfuscation with Cooperative Co-Evolutionary Algorithms
JM Aragón-Jurado, J Jareóo… - 2024 IEEE Congress …, 2024 - ieeexplore.ieee.org
Computing devices are ubiquitous nowadays and because of the rise of new paradigms as
the Internet of Things, their presence is continuously growing. Software (SW) is highly …
the Internet of Things, their presence is continuously growing. Software (SW) is highly …
Comparison of multi-objective optimization algorithms for the jshadobf javascript obfuscator
B Bertholon, S Varrette, P Bouvry - 2014 IEEE International …, 2014 - ieeexplore.ieee.org
With the advent of the Cloud Computing (CC) paradigm and the explosion of new Web
Services proposed over the Internet (such as Google Office Apps, Dropbox or Doodle), the …
Services proposed over the Internet (such as Google Office Apps, Dropbox or Doodle), the …