Obfuscation ≈ ObfuscationObfuscation
View article
Earnings management and annual report readability Open
We explore how the readability of annual reports varies with earnings management. Using the Fog Index to measure readability (Li, 2008), and focusing on the management discussion and analysis section of the annual report (MD&A), we predict…
View article
A Comprehensive Review on Malware Detection Approaches Open
According to the recent studies, malicious software (malware) is increasing at an alarming rate, and some malware can hide in the system by using different obfuscation techniques. In order to protect computer systems and the Internet from …
View article
Reliable evaluation of adversarial robustness with an ensemble of diverse parameter-free attacks Open
The field of defense strategies against adversarial attacks has significantly grown over the last years, but progress is hampered as the evaluation of adversarial defenses is often insufficient and thus gives a wrong impression of robustne…
View article
Asm2Vec: Boosting Static Representation Robustness for Binary Clone Search against Code Obfuscation and Compiler Optimization Open
Reverse engineering is a manually intensive but necessary technique for understanding the inner workings of new malware, finding vulnerabilities in existing systems, and detecting patent infringements in released software. An assembly clon…
View article
Dynamic Malware Analysis in the Modern Era—A State of the Art Survey Open
Although malicious software (malware) has been around since the early days of computers, the sophistication and innovation of malware has increased over the years. In particular, the latest crop of ransomware has drawn attention to the dan…
View article
Assessing social and environmental performance through narrative complexity in CSR reports Open
We analyse the relationship between the complexity of corporate social responsibility (CSR) disclosure and actual CSR performance, and postulate a positive association between actual CSR performance and readability and the size of CSR disc…
View article
An Efficient DenseNet-Based Deep Learning Model for Malware Detection Open
Recently, there has been a huge rise in malware growth, which creates a significant security threat to organizations and individuals. Despite the incessant efforts of cybersecurity research to defend against malware threats, malware develo…
View article
Metaverse in Healthcare Integrated with Explainable AI and Blockchain: Enabling Immersiveness, Ensuring Trust, and Providing Patient Data Security Open
Digitization and automation have always had an immense impact on healthcare. It embraces every new and advanced technology. Recently the world has witnessed the prominence of the metaverse which is an emerging technology in digital space. …
View article
Indistinguishability obfuscation from well-founded assumptions Open
Indistinguishability obfuscation, introduced by [Barak et. al. Crypto 2001], aims to compile programs into unintelligible ones while preserving functionality. It is a fascinating and powerful object that has been shown to enable a host of …
View article
A Survey on Malware Analysis Techniques: Static, Dynamic, Hybrid and Memory Analysis Open
Now a day the threat of malware is increasing rapidly. A software that sneaks to your computer system without your knowledge with a harmful intent to disrupt your computer operations. Due to the vast number of malware, it is impossible to …
View article
DroidSieve Open
With more than two million applications, Android marketplaces require automatic and scalable methods to efficiently vet apps for the absence of malicious threats. Recent techniques have successfully relied on the extraction of lightweight …
View article
How Well Do My Results Generalize? Comparing Security and Privacy Survey Results from MTurk, Web, and Telephone Samples Open
Security and privacy researchers often rely on data collected from Amazon Mechanical Turk (MTurk) to evaluate security tools, to understand users' privacy preferences and to measure online behavior. Yet, little is known about how well Turk…
View article
Location Privacy-Preserving Task Allocation for Mobile Crowdsensing with Differential Geo-Obfuscation Open
In traditional mobile crowdsensing applications, organizers need participants’ precise locations for optimal task allocation, e.g., minimizing selected workers’ travel distance to task locations. However, the exposure of their locations ra…
View article
Memories of unethical actions become obfuscated over time Open
Significance We identify a consistent reduction in the clarity and vividness of people’s memory of their past unethical actions, which explains why they behave dishonestly repeatedly over time. Across nine studies using diverse sample popu…
View article
DroidEvolver: Self-Evolving Android Malware Detection System Open
Given the frequent changes in the Android framework and the continuous evolution of Android malware, it is challenging to detect malware over time in an effective and scalable manner. To address this challenge, we propose DroidEvolver, an …
View article
Language - The Loaded Weapon: The Use and Abuse of Language Today Open
Today there is a reawakening interest in how language affects our lives. It comes with every threat to our safety and every promise of better times. It is a burning issue among minorities and a running debate between the attackers and defe…
View article
A Study on Malware and Malware Detection Techniques Open
The impact of malicious software are getting worse day by day.Malicious software or malwares are programs that are created to harm, interrupt or damage computers, networks and other resources associated with it.Malwares are transferred in …
View article
Sparse Mobile Crowdsensing With Differential and Distortion Location Privacy Open
Sparse Mobile Crowdsensing (MCS) has become a compelling approach to acquire and infer urban-scale sensing data. However, participants risk their location privacy when reporting data with their actual sensing positions. To address this iss…
View article
MineSweeper Open
A wave of alternative coins that can be effectively mined without specialized hardware, and a surge in cryptocurrencies’ market value has led to the development of cryptocurrency mining (cryptomining) services, such as Coinhive, which can …
View article
Tracking Mobile Web Users Through Motion Sensors: Attacks and Defenses Open
Modern smartphones contain motion sensors, such as accelerometers and gyroscopes.These sensors have many useful applications; however, they can also be used to uniquely identify a phone by measuring anomalies in the signals, which are a re…
View article
A comparison of code similarity analysers Open
Copying and pasting of source code is a common activity in software engineering. Often, the code is not copied as it is and it may be modified for various purposes; e.g. refactoring, bug fixing, or even software plagiarism. These code modi…
View article
Dynamic Malware Analysis with Feature Engineering and Feature Learning Open
Dynamic malware analysis executes the program in an isolated environment and monitors its run-time behaviour (e.g. system API calls) for malware detection. This technique has been proven to be effective against various code obfuscation tec…
View article
When Malware is Packin' Heat; Limits of Machine Learning Classifiers Based on Static Analysis Features Open
International audience
View article
MedCo: Enabling Secure and Privacy-Preserving Exploration of Distributed Clinical and Genomic Data Open
The increasing number of health-data breaches is creating a complicated environment for medical-data sharing and, consequently, for medical progress. Therefore, the development of new solutions that can reassure clinical sites by enabling …
View article
Obfuscapk: An open-source black-box obfuscation tool for Android apps Open
Obfuscapk is an open-source automatic obfuscation tool for Android apps that works in a black-box fashion (i.e., it does not need the app source code). Obfuscapk supports advanced obfuscation features and has a modular architecture that co…
View article
SmarPer: Context-Aware and Automatic Runtime-Permissions for Mobile Devices Open
Permission systems are the main defense that mobile platforms, such as Android and iOS, offer to users to protect their private data from prying apps. However, due to the tension between usability and control, such systems have several lim…
View article
A Digital DNA Sequencing Engine for Ransomware Detection Using Machine Learning Open
Malware is `malicious software' programs that carry out many of the cyberattacks on the Internet, including cybercrime, fraud, scams and nation-state cyberwar. These malicious software programs come in a wide range of different classificat…
View article
SMT Attack: Next Generation Attack on Obfuscated Circuits with Capabilities and Performance Beyond the SAT Attacks Open
In this paper, we introduce the Satisfiability Modulo Theory (SMT) attack on obfuscated circuits. The proposed attack is the superset of Satisfiability (SAT) attack, with many additional features. It uses one or more theory solvers in addi…
View article
Android Malware Detection Based on a Hybrid Deep Learning Model Open
In recent years, the number of malware on the Android platform has been increasing, and with the widespread use of code obfuscation technology, the accuracy of antivirus software and traditional detection algorithms is low. Current state-o…
View article
Stateful Detection of Black-Box Adversarial Attacks Open
The problem of adversarial examples, evasion attacks on machine learning classifiers, has proven extremely difficult to solve. This is true even in the black-box threat model, as is the case in many practical settings. Here, the classifier…