Mila Dalla Preda Code Obfuscation and Malware Detection

@inproceedings{Preda2007MilaDP,
  title={Mila Dalla Preda Code Obfuscation and Malware Detection},
  author={Mila Dalla Preda},
  year={2007}
}
Functions We already observed in Section 5.2.2 that a function f : Z → Z is decomposed into elementary functions, i.e., assembly instructions within some basic block. Following the same approach, let us assume that the function f can be expressed as a composition of elementary functions, namely f = λx.h(g1(x, ..., x), ..., gk(x, ..., x)) where h : Zk → Z… CONTINUE READING