Login / Signup

Obfuscation from Polynomial Hardness: Beyond Decomposable Obfuscation.

Yuan KangChengyu LinTal MalkinMariana Raykova
Published in: SCN (2018)
Keyphrases
  • reverse engineering
  • static analysis
  • control flow
  • np complete
  • data transformation
  • malware detection
  • computational complexity
  • neural network
  • search engine
  • relational databases
  • worst case
  • open source
  • markov networks