Ahmed EL-MAHDY


Generation of Efficient Obfuscated Code through Just-in-Time Compilation
Muhammad HATABA Ahmed EL-MAHDY Kazunori UEDA 
Publication:   
Publication Date: 2019/03/01
Vol. E102-D  No. 3  pp. 645-649
Type of Manuscript:  LETTER
Category: Dependable Computing
Keyword: 
cloud computing securitydynamic compilationobfuscationoptimization transformationsside-channels
 Summary | Full Text:PDF(1.3MB)