Protecting obfuscation against arithmetic attacks.
Eric MilesAmit SahaiMor WeissPublished in: IACR Cryptol. ePrint Arch. (2014)
Keyphrases
- unauthorized access
- countermeasures
- protection mechanisms
- access control
- malicious attacks
- reverse engineering
- watermarking scheme
- traffic analysis
- control flow
- arithmetic operations
- intrusion detection system
- security protocols
- terrorist attacks
- malware detection
- watermarking algorithm
- security policies
- computer security
- attack detection
- security threats
- malicious users
- database systems
- cryptographic protocols
- image watermarking
- security mechanisms
- static analysis
- sensitive data