@inproceedings{Preda2007MilaDP, title={Mila Dalla Preda Code Obfuscation and Malware Detection}, author={Mila Dalla Preda}, year={2007} }

- Published 2007

Functions We already observed in Section 5.2.2 that a function f : Z → Z is decomposed into elementary functions, i.e., assembly instructions within some basic block. Following the same approach, let us assume that the function f can be expressed as a composition of elementary functions, namely f = λx.h(g1(x, ..., x), ..., gk(x, ..., x)) where h : Zk → Z… CONTINUE READING

### Presentations referencing similar topics