Login / Signup

Exploiting Dynamic Scheduling for VM-Based Code Obfuscation.

Kaiyuan KuangZhanyong TangXiaoqing GongDingyi FangXiaojiang ChenTianzhang XingGuixin YeJie ZhangZheng Wang
Published in: Trustcom/BigDataSE/ISPA (2016)
Keyphrases
  • dynamic scheduling
  • static analysis
  • flexible manufacturing systems
  • control flow
  • virtual machine
  • process planning
  • reverse engineering
  • source code
  • data flow
  • grid services
  • knowledge base