Login / Signup
Twisting Additivity in Program Obfuscation.
Mila Dalla Preda
Wu Feng
Roberto Giacobazzi
Richard Greechie
Arun Lakhotia
Published in:
ICISTM (2012)
Keyphrases
</>
static analysis
control flow
reverse engineering
malware detection
databases
data structure
dynamic analysis
database
real time
data sets
neural network
programming course
program execution