Login / Signup

Contention in Cryptoland: Obfuscation, Leakage and UCE.

Mihir BellareIgors StepanovsStefano Tessaro
Published in: TCC (A2) (2016)
Keyphrases
  • reverse engineering
  • control flow
  • concurrency control
  • static analysis
  • data transformation
  • malware detection
  • data leakage prevention
  • neural network
  • learning algorithm
  • data model
  • data management
  • information leakage