搜索结果: 151-156 共查到“知识库 军事学 obfuscation”相关记录156条 . 查询时间(0.021 秒)
Non-Malleable Obfuscation
Non-Malleable Obfuscation malleability attacks Random Oracle model
2009/6/10
Existing definitions of program obfuscation do not rule out malleability attacks, where an adversary
that sees an obfuscated program is able to generate another (potentially obfuscated) program that ...
On the Secure Obfuscation of Deterministic Finite Automata(Extended Abstract)
Obfuscation deterministic finite automata state machines
2009/6/4
In this paper, we show how to construct secure obfuscation for Deterministic Finite Au-
tomata, assuming non-uniformly strong one-way functions exist. We revisit the software protec-
tion approaches...
Informally, an obfuscator O is an efficient, probabilistic “compiler” that transforms a program P into a new program O(P) with the same functionality as P, but such that O(P) protects any secrets that...
Clarifying Obfuscation: Improving the Security of White-Box Encoding
Security White-Box Encoding
2009/3/20
To ensure the security of software executing on malicious
hosts, as in digital rights management (DRM)
applications, it is desirable to encrypt or decrypt
content using white-box-encoded cryptograp...
An obfuscation O of a function F should satisfy two requirements:
firstly, using O it should be possible to evaluate F; secondly, O
should not reveal anything about F that cannot be learnt from orac...
We study the problem of circuit obfuscation, i.e., transforming the circuit in a way that hides
everything except its input-output behavior. Barak et al. showed that a universal obfuscator
that obfu...