C
search
search
reviewers
reviewers
feeds
feeds
assignments
assignments
settings
logout
Obfuscation from Polynomial Hardness: Beyond Decomposable Obfuscation.
Yuan Kang
Chengyu Lin
Tal Malkin
Mariana Raykova
Published in:
SCN (2018)
Keyphrases
</>
reverse engineering
static analysis
control flow
np complete
data transformation
malware detection
computational complexity
neural network
search engine
relational databases
worst case
open source
markov networks