• search
    search
  • reviewers
    reviewers
  • feeds
    feeds
  • assignments
    assignments
  • settings
  • logout

Exploiting Dynamic Scheduling for VM-Based Code Obfuscation.

Kaiyuan KuangZhanyong TangXiaoqing GongDingyi FangXiaojiang ChenTianzhang XingGuixin YeJie ZhangZheng Wang
Published in: Trustcom/BigDataSE/ISPA (2016)
Keyphrases
  • dynamic scheduling
  • static analysis
  • flexible manufacturing systems
  • control flow
  • virtual machine
  • process planning
  • reverse engineering
  • source code
  • data flow
  • grid services
  • knowledge base