<--- Back to Details
First PageDocument Content
Computer programming / Computing / Mathematics / Theoretical computer science / Boolean algebra / Error detection and correction / Compiler construction / Hash function / Avalanche effect / Optimizing compiler / Recursion / MD5
Date: 2017-04-03 15:56:44
Computer programming
Computing
Mathematics
Theoretical computer science
Boolean algebra
Error detection and correction
Compiler construction
Hash function
Avalanche effect
Optimizing compiler
Recursion
MD5

Cryptographic Function Detection in Obfuscated Binaries via Bit-precise Symbolic Loop Mapping Dongpeng Xu The Pennsylvania State University University Park, USA Email:

Add to Reading List

Source URL: www.ieee-security.org

Download Document from Source Website

File Size: 637,30 KB

Share Document on Facebook

Similar Documents

COMPILER CONSTRUCTION William M. Waite Department of Electrical Engineering University of Colorado Boulder, Colorado 80309

COMPILER CONSTRUCTION William M. Waite Department of Electrical Engineering University of Colorado Boulder, Colorado 80309

DocID: 1u5Ve - View Document

Combining Static and Dynamic Contract Checking for Curry Michael Hanus University of Kiel Programming Languages and Compiler Construction

Combining Static and Dynamic Contract Checking for Curry Michael Hanus University of Kiel Programming Languages and Compiler Construction

DocID: 1tKXN - View Document

CompSci 754: Compiler Construction and Theory John Boyland  Spring 2018 Office Office Hours

CompSci 754: Compiler Construction and Theory John Boyland Spring 2018 Office Office Hours

DocID: 1tCj1 - View Document

On Functional Logic Programming and its Application to Testing Sebastian Fischer Programming Languages and Compiler Construction Department of Computing Science Christian-Albrechts University of Kiel

On Functional Logic Programming and its Application to Testing Sebastian Fischer Programming Languages and Compiler Construction Department of Computing Science Christian-Albrechts University of Kiel

DocID: 1sWAw - View Document

Accurate prediction of the behavior of multithreaded applications in shared caches

Accurate prediction of the behavior of multithreaded applications in shared caches

DocID: 1rtkc - View Document