Sign in

Twisting Additivity in Program Obfuscation.

Mila Dalla PredaWu FengRoberto GiacobazziRichard GreechieArun Lakhotia
Published in: ICISTM (2012)
Keyphrases
  • static analysis
  • control flow
  • reverse engineering
  • malware detection
  • databases
  • data structure
  • dynamic analysis
  • database
  • real time
  • data sets
  • neural network
  • programming course
  • program execution