Back to Results
First PageMeta Content
Obfuscation / Assembly languages / Source code / Java platform / Obfuscated code / Interpreter / Opaque predicate / Java / JAR / Computing / Software / Cross-platform software


EVALUATION OF THE EFFICACY OF CONTROL FLOW OBFUSCATION AGAINST PROFILING AND INTELLIGENT STATIC ATTACKS By SRINIVASAN CHANDRASEKHARAN ____________________
Add to Reading List

Document Date: 2010-09-26 23:54:05


Open Document

File Size: 619,27 KB

Share Result on Facebook

Currency

pence / /

Facility

Byte-Code Engineering Library / Computer Science UNIVERSITY OF ARIZONA DECEMBER / University Library / University of Arizona / /

IndustryTerm

reverse engineering tools / remote server / software runs / automatic tools / obfuscation tool / software developer / large applications / immediate solution / software development / software piracy / /

Organization

UNIVERSITY OF ARIZONA / Computer Science Department / /

Person

Marcus Dahm / Saumya Debray / /

Position

AUTHOR / specific virtual machine interpreter / software developer / virtual machine interpreter / programmer / Intermediate Code VIRTUAL MACHINE INTERPRETER / /

ProgrammingLanguage

Java bytecode / C / Java / /

ProvinceOrState

Arizona / /

Technology

encryption / virtual machine / Java / Bogus Predicates This algorithm / /

SocialTag