Login / Signup

Leakage Resilience from Program Obfuscation.

Dana Dachman-SoledS. Dov GordonFeng-Hao LiuAdam O'NeillHong-Sheng Zhou
Published in: J. Cryptol. (2019)
Keyphrases
  • static analysis
  • control flow
  • missing data
  • reverse engineering
  • computer programs
  • databases
  • genetic algorithm
  • learning algorithm
  • social networks
  • similarity measure
  • data structure
  • data model
  • operating system