Login / Signup
AOP-Based Attack on Obfuscated Java Code.
Yuan-Yuan Li
Published in:
CIS (2) (2009)
Keyphrases
</>
java code
development tools
source code
aspect oriented programming
reverse engineering
security policies
byte code
countermeasures
secret key
database
databases
information systems
mobile devices
open source
application development