Login / Signup
Obfuscation from Polynomial Hardness: Beyond Decomposable Obfuscation.
Yuan Kang
Chengyu Lin
Tal Malkin
Mariana Raykova
Published in:
IACR Cryptol. ePrint Arch. (2019)
Keyphrases
</>
reverse engineering
static analysis
malware detection
control flow
np complete
data transformation
data mining
real world
decision trees
np hard
information theoretic
phase transition
markov networks
low order