2022
DOI: 10.1109/tdsc.2021.3123159
|View full text |Cite
|
Sign up to set email alerts
|

Model of Execution Trace Obfuscation Between Threads

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
1
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
2

Relationship

1
1

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 34 publications
0
1
0
Order By: Relevance
“…Second, implementing model watermarking which involves adding a unique identifier or "watermark" to the model, in order to help in identifying the source of any copied models. Third, leveraging model obfuscation [99] which involves making the model more difficult to understand or reverse-engineer. Fourth, implementing model versioning that helps the participants to keep track of versions of the model, which is helpful in implementing controls to ensure that only authorized users have access to the latest version, hence preventing the use of outdated or stolen models.…”
Section: ) Overfitting Attacksmentioning
confidence: 99%
“…Second, implementing model watermarking which involves adding a unique identifier or "watermark" to the model, in order to help in identifying the source of any copied models. Third, leveraging model obfuscation [99] which involves making the model more difficult to understand or reverse-engineer. Fourth, implementing model versioning that helps the participants to keep track of versions of the model, which is helpful in implementing controls to ensure that only authorized users have access to the latest version, hence preventing the use of outdated or stolen models.…”
Section: ) Overfitting Attacksmentioning
confidence: 99%
“…Linn et al [25] focused on the static disassembly process and proposed two algorithms to disturb the static disassembly, which failed the disassembly of executable files. Sha et al [26] protect the function calling process using multi-threaded mutually exclusive execution. e method creates multiple threads in a program.…”
Section: Introductionmentioning
confidence: 99%