Article ID | Journal | Published Year | Pages | File Type |
---|---|---|---|---|
10349127 | Journal of Systems and Software | 2005 | 13 Pages |
Abstract
Finally, we discuss the feasibility of our approach by showing how to contrast the obfuscation techniques based on malicious identifier renaming recently presented in literature.
Related Topics
Physical Sciences and Engineering
Computer Science
Computer Networks and Communications
Authors
S. Cimato, A. De Santis, U. Ferraro Petrillo,