Sign in

Impossibility of VBB Obfuscation with Ideal Constant-Degree Graded Encodings.

Rafael PassAbhi Shelat
Published in: TCC (A1) (2016)
Keyphrases
  • reverse engineering
  • neural network
  • control flow
  • planning problems
  • malware detection
  • database
  • databases
  • lower bound
  • relational databases
  • data transformation