AJB Brush, J Krumm, J Scott - Proceedings of the 12th ACM international …, 2010 - dl.acm.org
… that it assumes that everyone is carrying a GPS device so that there would be people available to mix your data with, and the size of the region would vary with population density. …
… devices and the technical improvements of location … perturbation process, called obfuscation, are i) to allow users to … a set of techniques robust against a relevant class of de-obfuscation …
… : gentiles wearing the Yellow Star as an act of protest, providing a population into … devices that trigger radar detectors' warning signals without actually measuring speed. These devices …
… But the measurements of power by such devices can be mapped to users and reveal their lifestyle … of the overall population and thus we employ a simple distributed method in which the …
… and analyze the obfuscationtechniques used by malware … efficiency of the defense techniques used for code protection. This … access the device files without the deviceuser knowledge. …
F Zhang, H Huang, S Zhu, D Wu, P Liu - … of the 2014 ACM conference on …, 2014 - dl.acm.org
… In recent years, as the wide use and rapid development of mobile devices such as smartphones and tablets, mobile application (app) markets are growing rapidly. There were over 1, …
M Sosonkin, G Naumovich, N Memon - … of the 3rd ACM workshop on …, 2003 - dl.acm.org
… We describe three techniques for obfuscation of program design. The class coalescing obfuscation replaces several classes with a single class. The class splitting obfuscation replaces …
… is the process by which we generalize from a sample a characteristic of the population. … such as hardware statistics and system settings, to uniquely identify devices. Instead, the …
… hidden program functionality, uncover firmware features that are disabled in low-cost devices… Heuristicsand statistics-based strategies are used to determine the exact moment when the …