Publisher
Springer Nature Switzerland
Reference23 articles.
1. Aho, A.V., Lam, M.S., Sethi, R., Ullman, J.D.: Compilers: Principles, Techniques, and Tools, 2nd edn. Addison-Wesley Longman Publishing Co. Inc. (2006)
2. Arceri, V., Mastroeni, I.: Analyzing dynamic code: a sound abstract interpreter for evil eval. ACM Trans. Priv. Secur. 24(2), 1–38 (2021). https://doi.org/10.1145/3426470
3. Blanc, G., Miyamoto, D., Akiyama, M., Kadobayashi, Y.: Characterizing obfuscated javascript using abstract syntax trees: experimenting with malicious scripts. In: 2012 26th International Conference on Advanced Information Networking and Applications Workshops, pp. 344–351 (2012). https://doi.org/10.1109/WAINA.2012.140
4. Cassagne, J.: Payloads dataset. https://github.com/weimdall/phishing-evals
5. Cassagne, J.: Source code. https://github.com/weimdall/obfuscation-analyzer