Login / Signup
Analyzing Memory Accesses in Obfuscated x86 Executables.
Michael Venable
Mohamed R. Chouchane
Md. Enamul Karim
Arun Lakhotia
Published in:
DIMVA (2005)
Keyphrases
</>
memory usage
reverse engineering
computing power
source code
memory space
memory access
search algorithm
nearest neighbor
memory requirements
database
computational power
access patterns
processing units
limited memory
memory size
low memory