Login / Signup
Chosen-Instruction Attack Against Commercial Code Virtualization Obfuscators.
Shijia Li
Chunfu Jia
Pengda Qiu
Qiyuan Chen
Jiang Ming
Debin Gao
Published in:
NDSS (2022)
Keyphrases
</>
source code
virtual machine
multimedia
countermeasures
operating system
cloud computing
instruction set
distributed computing
static analysis
high availability
database systems
programming language
computer assisted instruction
malicious users