Login / Signup
Obfuscation resilient binary code reuse through trace-oriented programming.
Junyuan Zeng
Yangchun Fu
Kenneth A. Miller
Zhiqiang Lin
Xiangyu Zhang
Dongyan Xu
Published in:
CCS (2013)
Keyphrases
</>
oriented programming
binary codes
hamming distance
gray code
object oriented
similarity search
reverse engineering
multi agent
hash functions
image collections
learning algorithm
low dimensional
data sets
neural network
face recognition