Login / Signup
Obfuscation Combiners.
Marc Fischlin
Amir Herzberg
Hod Bin Noon
Haya Shulman
Published in:
CRYPTO (2) (2016)
Keyphrases
</>
reverse engineering
control flow
static analysis
data transformation
malware detection
machine learning
data flow
decision trees
bayesian networks
individual classifiers