Zeroizing Attacks on Indistinguishability Obfuscation over CLT13.
Jean-Sébastien CoronMoon Sung LeeTancrède LepointMehdi TibouchiPublished in: Public Key Cryptography (1) (2017)
Keyphrases
- countermeasures
- reverse engineering
- static analysis
- control flow
- security threats
- encryption scheme
- watermarking scheme
- watermarking algorithm
- computer security
- denial of service attacks
- terrorist attacks
- attack detection
- security mechanisms
- information systems
- image watermarking
- t norm
- malware detection
- traffic analysis