Research Article
Security Analysis on Blockchain-Powered Mobile APPs Connected with In-Vehicle Networks by Context-Based Reverse Engineering
| Input: 4-order tensor A | | Output: (List_p(A) [1], ……, List_p(A)[|p|]), (List_d(A) [1], …, List_d(A)[|d|]), (List_o(A) [1], …, List_o(A)[|o|]) | (1) | for each p ∈ p: | (2) | //the number of revealed semantics in p order | | Amount = SemanticNum(A(p)); | (3) | List_p(A)[p].add(Amount); | (4) | end for | (5) | return List_p(A)[|p|] | (6) | for each d ∈ d: | (7) | //the number of revealed semantics in d order | | Amount = SemanticNum(A(d)); | (8) | List_d(A)[d].add(Amount); | (9) | end for | (10) | return List_d(A)[|d|] | (11) | for each o ∈ o: | (12) | //the number of revealed semantics in o order | | Amount = SemanticNum(A(o)); | (13) | List_o(A)[o].add(Amount); | (14) | end for | (15) | return List_o(A)[|o|] |
|