Login / Signup

Modeling Obfuscation Stealth Through Code Complexity.

Sebastian SchrittwieserElisabeth WimmerKevin MallingerPatrick KochbergerCaroline LawitschkaSebastian RaubitzekEdgar R. Weippl
Published in: ESORICS Workshops (2) (2023)
Keyphrases
  • multiscale
  • real time
  • source code
  • reverse engineering
  • website
  • np hard
  • worst case
  • privacy preserving
  • static analysis