Login / Signup
Pinpointing and Hiding Surprising Fragments in an Obfuscated Program.
Yuichiro Kanzaki
Clark D. Thomborson
Akito Monden
Christian S. Collberg
Published in:
PPREW@ACSAC (2015)
Keyphrases
</>
reverse engineering
neural network
java programs
bayesian networks
digital libraries
operating system
static analysis
malicious code