Protecting Obfuscation against Algebraic Attacks.
Boaz BarakSanjam GargYael Tauman KalaiOmer PanethAmit SahaiPublished in: EUROCRYPT (2014)
Keyphrases
- unauthorized access
- access control
- countermeasures
- protection mechanisms
- reverse engineering
- security threats
- static analysis
- intrusion detection system
- security policies
- sensitive data
- digital image watermarking
- malicious users
- traffic analysis
- java card
- control flow
- security mechanisms
- data sets
- watermarking scheme
- higher order
- data transformation
- malware detection
- watermarking algorithm
- signal processing
- security risks
- cooperative
- database systems
- data mining