Login / Signup

Pinpointing and Hiding Surprising Fragments in an Obfuscated Program.

Yuichiro KanzakiClark D. ThomborsonAkito MondenChristian S. Collberg
Published in: PPREW@ACSAC (2015)
Keyphrases
  • reverse engineering
  • neural network
  • java programs
  • bayesian networks
  • digital libraries
  • operating system
  • static analysis
  • malicious code