Assessing the Security Properties of Software Obfuscation.
Hui XuMichael R. LyuPublished in: IEEE Secur. Priv. (2016)
Keyphrases
- security properties
- security vulnerabilities
- security requirements
- formal methods
- security analysis
- formal model
- control flow
- static analysis
- software architecture
- security protocols
- software systems
- source code
- software development
- reverse engineering
- cryptographic protocols
- modeling language
- software components
- public key
- model checking
- intrusion detection
- lightweight
- computer systems
- peer to peer
- case study