• search
    search
  • reviewers
    reviewers
  • feeds
    feeds
  • assignments
    assignments
  • settings
  • logout

Pinpointing and Hiding Surprising Fragments in an Obfuscated Program.

Yuichiro KanzakiClark D. ThomborsonAkito MondenChristian S. Collberg
Published in: PPREW@ACSAC (2015)
Keyphrases
  • reverse engineering
  • neural network
  • java programs
  • bayesian networks
  • digital libraries
  • operating system
  • static analysis
  • malicious code