Search
Protecting software through obfuscation
:Can it keep pace with progress in code analysis?
Schrittwieser S., Katzenbeisser S., Kinder J., Merzdovnik G., Weippl E. ACM Computing Surveys49(1):1-37,2016.Type:Article
To:
Your Colleague's E-mail:
From:
Your E-mail:
Subject:
Reviews: Protecting software through obfuscation
Message Body:
Reproduction in whole or in part without permission is prohibited. Copyright 1999-2024 ThinkLoud
®
Terms of Use
|
Privacy Policy