• search
    search
  • reviewers
    reviewers
  • feeds
    feeds
  • assignments
    assignments
  • settings
  • logout

Obfuscation from Polynomial Hardness: Beyond Decomposable Obfuscation.

Yuan KangChengyu LinTal MalkinMariana Raykova
Published in: SCN (2018)
Keyphrases
  • reverse engineering
  • static analysis
  • control flow
  • np complete
  • data transformation
  • malware detection
  • computational complexity
  • neural network
  • search engine
  • relational databases
  • worst case
  • open source
  • markov networks