Login / Signup
Explaining Binary Obfuscation.
Claudia Greco
Michele Ianni
Antonella Guzzo
Giancarlo Fortino
Published in:
CSR (2023)
Keyphrases
</>
reverse engineering
data sets
optimal solution
non binary
genetic algorithm
decision trees
multiscale
multi valued
gray code
clustering algorithm
feature space
multiresolution
object oriented
hamming distance
static analysis
control flow