Zeroizing Attacks on Indistinguishability Obfuscation over CLT13.
Jean-Sébastien CoronMoon Sung LeeTancrède LepointMehdi TibouchiPublished in: IACR Cryptol. ePrint Arch. (2016)
Keyphrases
- countermeasures
- malicious attacks
- traffic analysis
- reverse engineering
- static analysis
- database views
- java card
- malware detection
- relational databases
- security protocols
- unauthorized access
- attack detection
- security mechanisms
- software engineering
- data transformation
- computer security
- watermarking technique
- security threats
- anti virus
- watermarking scheme
- network traffic
- access control