Anti-disassembly using Cryptographic Hash Functions.
John AycockRennie deGraafMichael J. Jacobson Jr.Published in: J. Comput. Virol. (2006)
Keyphrases
- hash functions
- locality sensitive
- approximate nearest neighbor search
- similarity search
- reverse engineering
- order preserving
- hashing algorithm
- hamming distance
- locality sensitive hashing
- secret key
- stream cipher
- data distribution
- encryption scheme
- hashing methods
- databases
- hash table
- nearest neighbor search
- support vector
- neural network