Login / Signup
On Secure and Usable Program Obfuscation: A Survey.
Hui Xu
Yangfan Zhou
Yu Kang
Michael R. Lyu
Published in:
CoRR (2017)
Keyphrases
</>
static analysis
control flow
diffie hellman
authentication scheme
data flow
computer programs
security requirements
key management
security mechanisms
program execution
dynamic analysis
security protocols
security analysis
data sets
reverse engineering
open source
databases