Login / Signup

Obfuscation Combiners.

Marc FischlinAmir HerzbergHod Bin NoonHaya Shulman
Published in: CRYPTO (2) (2016)
Keyphrases
  • reverse engineering
  • control flow
  • static analysis
  • data transformation
  • malware detection
  • machine learning
  • data flow
  • decision trees
  • bayesian networks
  • individual classifiers