Research Article

Security Analysis on Blockchain-Powered Mobile APPs Connected with In-Vehicle Networks by Context-Based Reverse Engineering

Algorithm 1

Max-compute (A).
Input: 4-order tensor A
Output: (List_p(A) [1], ……, List_p(A)[|p|]), (List_d(A) [1], …, List_d(A)[|d|]), (List_o(A) [1], …, List_o(A)[|o|])
(1)for each p ∈ p:
(2)  //the number of revealed semantics in p order
Amount = SemanticNum(A(p));
(3)   List_p(A)[p].add(Amount);
(4)end for
(5)return List_p(A)[|p|]
(6)for each d ∈ d:
(7)  //the number of revealed semantics in d order
Amount = SemanticNum(A(d));
(8)   List_d(A)[d].add(Amount);
(9)end for
(10)return List_d(A)[|d|]
(11)for each o ∈ o:
(12)  //the number of revealed semantics in o order
Amount = SemanticNum(A(o));
(13)   List_o(A)[o].add(Amount);
(14)end for
(15)return List_o(A)[|o|]