Login / Signup
Random table and hash coding-based binary code obfuscation against stack trace analysis.
Xin Xie
Bin Lu
Daofu Gong
Xiangyang Luo
Fenlin Liu
Published in:
IET Inf. Secur. (2016)
Keyphrases
</>
data structure
data analysis
database
search engine
pattern recognition
data streams
static analysis