Login / Signup
Indistinguishability Obfuscation versus Point Obfuscation with Auxiliary Input.
Christina Brzuska
Arno Mittelbach
Published in:
IACR Cryptol. ePrint Arch. (2014)
Keyphrases
</>
reverse engineering
static analysis
control flow
malware detection
data transformation
dynamic analysis
data sets
clustering algorithm
social networks
open source
data flow