Constrained Obfuscation to Thwart Pattern Matching Attacks.
Saeede EnayatiDennis L. GoeckelAmir HoumansadrHossein Pishro-NikPublished in: ISIT (2022)
Keyphrases
- pattern matching
- regular expressions
- pattern matching algorithm
- matching process
- string matching
- tree matching
- boyer moore
- reverse engineering
- graph matching
- approximate pattern matching
- hamming distance
- databases
- suffix tree
- bit parallel
- matching strategy
- malware detection
- watermarking technique
- watermarking scheme
- relational databases