Sign in

Random table and hash coding-based binary code obfuscation against stack trace analysis.

Xin XieBin LuDaofu GongXiangyang LuoFenlin Liu
Published in: IET Inf. Secur. (2016)
Keyphrases
  • data structure
  • data analysis
  • database
  • search engine
  • pattern recognition
  • data streams
  • static analysis