Search results
Jump to navigation
Jump to search
- ...R07.pdf|hdl=1721.1/129413|s2cid=1186014 |hdl-access=free}}</ref> Black-box obfuscation has been proven to be impossible, even in principle.<ref name=":0">{{Cite j ...ware|url=https://blog.cryptographyengineering.com/2014/02/21/cryptographic-obfuscation-and/|access-date=2021-03-14|website=A Few Thoughts on Cryptographic Enginee ...7 KB (1,015 words) - 15:58, 14 October 2024
- {{short description|Type of cryptographic software obfuscation}} ...ica Klarreich |date=2014-02-03 |title=Cryptography Breakthrough Could Make Software Unhackable |url=https://www.wired.com/2014/02/cryptography-breakthrough/ |n ...23 KB (3,107 words) - 13:53, 10 October 2024
- ...nd investigated other properties of malware such as detectability and self-obfuscation using rudimentary encryption. His 1988 Doctoral dissertation was on the sub ...software engineering conf. and the ACM SIGSOFT symp. on The foundations of software engineering, 2007, p. 5-14</ref> point out that malware authors cannot eas ...8 KB (1,175 words) - 06:41, 15 February 2025
- ...te=Google Maps for AngularJS |access-date=7 April 2015 }}</ref> It uses an obfuscation algorithm<ref>{{cite web |url=http://m.it168.com/article_1778861.html |titl Despite the secrecy surrounding the GCJ-02 obfuscation, several open-source projects exist that provide conversions between GCJ-02 ...29 KB (3,870 words) - 19:33, 31 July 2024
- ...=2008-07-31}}</ref><ref>{{Cite book |last=Contini |first=Scott |title=Fast Software Encryption |last2=Matusiewicz |first2=Krystian |last3=Pieprzyk |first3=Jose ...aters |first6=Brent |date=2013-01-01 |title=Candidate Indistinguishability Obfuscation and Functional Encryption for all circuits |url=https://eprint.iacr.org/201 ...24 KB (3,173 words) - 01:44, 18 February 2025
- The untrusted [[third-party software component|third-party]] model is adopted in peer-to-peer environments.<ref ...ally satisfied by using spatial cloaking, temporal cloaking, or location [[obfuscation]].<ref name=":12" /> Spatial and temporal cloaking refers to the wrong or i ...55 KB (7,739 words) - 07:36, 21 December 2024
- ...Tons of alcohol", etcetera. Such edits DO NOT improve the article but add obfuscation and, in some cases, constitute subversive vandalism. They WILL be reverted. ...metric functions.<ref>{{cite book |title=Intel® 64 and IA-32 Architectures Software Developer's Manual Combined Volumes: 1, 2A, 2B, 2C, 3A, 3B and 3C |year=201 ...50 KB (7,134 words) - 04:00, 2 February 2025
- ...two different categories: [[Black box|black box attacks]] and [[White box (software engineering)|white box attacks]].<ref name=":3" /> * Gradient masking/obfuscation techniques: to prevent the adversary exploiting the gradient in white-box a ...67 KB (9,432 words) - 13:32, 21 February 2025