Login / Signup

Indistinguishability Obfuscation versus Multi-bit Point Obfuscation with Auxiliary Input.

Christina BrzuskaArno Mittelbach
Published in: ASIACRYPT (2) (2014)
Keyphrases
  • reverse engineering
  • static analysis
  • control flow
  • data transformation
  • malware detection
  • databases
  • neural network
  • user input
  • artificial intelligence
  • rough sets
  • computer systems
  • equivalence relation