1 code implementation • 6 Jun 2018 • Fang-Hsiang Su, Jonathan Bell, Gail Kaiser, Baishakhi Ray
It is challenging to search for executables relevant to an obfuscated application for developers to analyze efficiently.
Software Engineering Cryptography and Security