Login / Signup
Contention in Cryptoland: Obfuscation, Leakage and UCE.
Mihir Bellare
Igors Stepanovs
Stefano Tessaro
Published in:
IACR Cryptol. ePrint Arch. (2015)
Keyphrases
</>
reverse engineering
static analysis
malware detection
control flow
data transformation
search algorithm
software engineering
concurrency control
real time
data sets
wireless sensor networks
access control
information leakage