狠狠撸shows by User: akihitonagai96 / http://www.slideshare.net/images/logo.gif 狠狠撸shows by User: akihitonagai96 / Sat, 18 Mar 2017 15:07:43 GMT 狠狠撸Share feed for 狠狠撸shows by User: akihitonagai96 遗伝的アルゴリズムによる狈クイーン问题の解法 /slideshow/n-73283027/73283027 gan-170318150743
解析的な方法で解くことができず、Nか?増えることによって爆発的に解か?増えることて?知られている「Nクイーン問題」を、遺伝的アルゴリズム GA を用いて解く場合の解法について解説する]]>

解析的な方法で解くことができず、Nか?増えることによって爆発的に解か?増えることて?知られている「Nクイーン問題」を、遺伝的アルゴリズム GA を用いて解く場合の解法について解説する]]>
Sat, 18 Mar 2017 15:07:43 GMT /slideshow/n-73283027/73283027 akihitonagai96@slideshare.net(akihitonagai96) 遗伝的アルゴリズムによる狈クイーン问题の解法 akihitonagai96 解析的な方法で解くことができず、Nか?増えることによって爆発的に解か?増えることて?知られている「Nクイーン問題」を、遺伝的アルゴリズム GA を用いて解く場合の解法について解説する <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/gan-170318150743-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> 解析的な方法で解くことができず、Nか?増えることによって爆発的に解か?増えることて?知られている「Nクイーン問題」を、遺伝的アルゴリズム GA を用いて解く場合の解法について解説する
遗伝的アルゴリズムによる狈クイーン问题の解法 from Akihito Nagai
]]>
1481 2 https://cdn.slidesharecdn.com/ss_thumbnails/gan-170318150743-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
保护コート?の自然さに着目した命令カムフラーシ?ュ /slideshow/ss-73282790/73282790 random-170318145206
This study proposes a method for constructing natural protection code, that is, code with no artificial code fragments, based on the instruction camouflage technique. An artificial code fragment is a code fragment that does not resemble raw compiled code, which often appears in protection code. In the proposed method, first, the artificiality of each n-gram which makes up the protection code is evaluated based on the probability of occurrence of the n-gram. Then the artificial code fragments are camouflaged with dummy code fragments that are less artificial. The routines which restore the code are also inserted so that they do not cause malfunction or produce another artificial code fragments, taking into account the control flow of the code. The protection code that is transformed by the proposed method can be difficult to locate by attackers, which may improve the stealth of the protection code. In the case study, the proposed method is applied to a program protected by a well-known obfuscation method and the stealth of the transformed code is discussed. Keywords: software protection, obfuscation, instruction camouflage, code artificiality]]>

This study proposes a method for constructing natural protection code, that is, code with no artificial code fragments, based on the instruction camouflage technique. An artificial code fragment is a code fragment that does not resemble raw compiled code, which often appears in protection code. In the proposed method, first, the artificiality of each n-gram which makes up the protection code is evaluated based on the probability of occurrence of the n-gram. Then the artificial code fragments are camouflaged with dummy code fragments that are less artificial. The routines which restore the code are also inserted so that they do not cause malfunction or produce another artificial code fragments, taking into account the control flow of the code. The protection code that is transformed by the proposed method can be difficult to locate by attackers, which may improve the stealth of the protection code. In the case study, the proposed method is applied to a program protected by a well-known obfuscation method and the stealth of the transformed code is discussed. Keywords: software protection, obfuscation, instruction camouflage, code artificiality]]>
Sat, 18 Mar 2017 14:52:06 GMT /slideshow/ss-73282790/73282790 akihitonagai96@slideshare.net(akihitonagai96) 保护コート?の自然さに着目した命令カムフラーシ?ュ akihitonagai96 This study proposes a method for constructing natural protection code, that is, code with no artificial code fragments, based on the instruction camouflage technique. An artificial code fragment is a code fragment that does not resemble raw compiled code, which often appears in protection code. In the proposed method, first, the artificiality of each n-gram which makes up the protection code is evaluated based on the probability of occurrence of the n-gram. Then the artificial code fragments are camouflaged with dummy code fragments that are less artificial. The routines which restore the code are also inserted so that they do not cause malfunction or produce another artificial code fragments, taking into account the control flow of the code. The protection code that is transformed by the proposed method can be difficult to locate by attackers, which may improve the stealth of the protection code. In the case study, the proposed method is applied to a program protected by a well-known obfuscation method and the stealth of the transformed code is discussed. Keywords: software protection, obfuscation, instruction camouflage, code artificiality <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/random-170318145206-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> This study proposes a method for constructing natural protection code, that is, code with no artificial code fragments, based on the instruction camouflage technique. An artificial code fragment is a code fragment that does not resemble raw compiled code, which often appears in protection code. In the proposed method, first, the artificiality of each n-gram which makes up the protection code is evaluated based on the probability of occurrence of the n-gram. Then the artificial code fragments are camouflaged with dummy code fragments that are less artificial. The routines which restore the code are also inserted so that they do not cause malfunction or produce another artificial code fragments, taking into account the control flow of the code. The protection code that is transformed by the proposed method can be difficult to locate by attackers, which may improve the stealth of the protection code. In the case study, the proposed method is applied to a program protected by a well-known obfuscation method and the stealth of the transformed code is discussed. Keywords: software protection, obfuscation, instruction camouflage, code artificiality
保护コート?の自然さに着目した命令カムフラーシ?ュ from Akihito Nagai
]]>
223 3 https://cdn.slidesharecdn.com/ss_thumbnails/random-170318145206-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
https://cdn.slidesharecdn.com/profile-photo-akihitonagai96-48x48.jpg?cb=1618881307 https://cdn.slidesharecdn.com/ss_thumbnails/gan-170318150743-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/n-73283027/73283027 遗伝的アルゴリズムによる狈クイーン问题の解法 https://cdn.slidesharecdn.com/ss_thumbnails/random-170318145206-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/ss-73282790/73282790 保护コート?の自然さに着目した命令カムフラーシ?ュ