Obfuscation

Known as: Shroud, Obfuscator, Obfuscated code 
In software development, manual obfuscation is the deliberate act of creating obfuscated code, i.e. source or machine code that is difficult for… (More)
Wikipedia

Topic mentions per year

Topic mentions per year

1953-2018
010020030019532017

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2013
Highly Cited
2013
In this work, we study indistinguishability obfuscation and functional encryption for general circuits: Indistinguishability… (More)
Is this relevant?
Highly Cited
2011
Highly Cited
2011
The pervasive diffusion of mobile communication devices and the technical improvements of location techniques are fostering the… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2008
Highly Cited
2008
Malware programs that incorporate trigger-based behavior initiate malicious activities based on conditions satisfied only by… (More)
  • figure 1
  • figure 4
  • figure 5
  • figure 6
  • figure 8
Is this relevant?
Highly Cited
2007
Highly Cited
2007
An obfuscator is a compiler that transforms any program (which we will view in this work as a boolean circuit) into an obfuscated… (More)
Is this relevant?
Highly Cited
2005
Highly Cited
2005
Obfuscation concerns the practice of deliberately degrading the quality of information in some way, so as to protect the privacy… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
Is this relevant?
Highly Cited
2004
Highly Cited
2004
Informally, an obfuscator O is an efficient, probabilistic “compiler” that transforms a program P into a new program O(P ) with… (More)
Is this relevant?
Highly Cited
2003
Highly Cited
2003
Attacks which exploit memory programming errors (such as buffer overflows) are one of today’s most serious security threats… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2003
Highly Cited
2003
A great deal of software is distributed in the form of executable code. The ability to reverse engineer such executables can… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2001
Highly Cited
2001
We examine the competition between a group of Internet retailers who operate in an environment where a price search engine plays… (More)
  • figure 1
  • figure 2
  • figure 3
  • table I
  • table II
Is this relevant?
Highly Cited
2000
Highly Cited
2000
  • 2000
component of this work in other works must be obtained from the IEEE. This material is presented to ensure timely dissemination… (More)
Is this relevant?