Protecting Obfuscation Against Algebraic Attacks.
Boaz BarakSanjam GargYael Tauman KalaiOmer PanethAmit SahaiPublished in: IACR Cryptol. ePrint Arch. (2013)
Keyphrases
- unauthorized access
- protection mechanisms
- access control
- countermeasures
- reverse engineering
- sensitive data
- static analysis
- malicious attacks
- java card
- watermarking scheme
- security policies
- security risks
- privacy preservation
- computer security
- security threats
- intrusion detection system
- higher order
- malware detection
- traffic analysis
- cooperative
- security mechanisms
- algebraic geometry