Uploads
Contact
/
Login
Upload
Search Results for 'Obfuscation'
Everybodyloves(virtualblack-box/indistinguishability)obfuscation... ..
yoshiko-marsland
MalwareAnalysisatScaleJackdawEvaluationConclusions
phoebe-click
Obfuscation
phoebe-click
From the Impossibility of Obfuscation
tatyana-admore
Invoke-
natalia-silvester
Understanding software that doesn’t want to be understood
sherrill-nordquist
Security Through Obscurity
lindy-dunigan
Environmental Authentication in Malware
tatyana-admore
All Euphemisms are not Alike
conchita-marotz
Java
jane-oiler
Compilers and
stefany-barnette
Extractable Functions Nir
min-jolicoeur
Extractable Functions
stefany-barnette
Seeing through Network-Protocol Obfuscation
tatiana-dople
February 22, 2016 Tracking Mobile Web Users Through Motion Sensors: Attacks and Defenses
marina-yarberry
February 22, 2016 Tracking Mobile Web Users Through Motion Sensors: Attacks and Defenses
yoshiko-marsland
Protecting Location Privacy
danika-pritchard