Login / Signup
Leakage Resilience from Program Obfuscation.
Dana Dachman-Soled
S. Dov Gordon
Feng-Hao Liu
Adam O'Neill
Hong-Sheng Zhou
Published in:
J. Cryptol. (2019)
Keyphrases
</>
static analysis
control flow
missing data
reverse engineering
computer programs
databases
genetic algorithm
learning algorithm
social networks
similarity measure
data structure
data model
operating system