Login / Signup
Abusing Android Runtime for Application Obfuscation.
Pierre Graux
Jean-François Lalande
Pierre Wilke
Valérie Viet Triem Tong
Published in:
EuroS&P Workshops (2020)
Keyphrases
</>
databases
data mining
decision making
metadata
high level
data structure
mobile devices
evolutionary algorithm
decision support
reverse engineering
key technologies