Login / Signup
Attacking Signed Binaries.
Marco Slaviero
Jaco Kroon
Martin S. Olivier
Published in:
ISSA (2005)
Keyphrases
</>
source code
reverse engineering
control flow
information security
open source software
probability distribution
neural network
real time
artificial intelligence
open source
data mining
face recognition
data structure