Publisher
Springer Nature Switzerland
Reference27 articles.
1. Abrath, B., Coppens, B., Volckaert, S., Wijnant, J., Bjorn, S.D.: Tightly-coupled self-debugging software protection. In: Proceedings of SSPREW 2016: Workshop on Software Security, Protection, and Reverse Engineering. Los Angeles (USA), pp. 1–10 (2016). https://doi.org/10.1145/3015135.3015142
2. Borzacchiello, L., Coppa, E., Demetrescu, C.: Fuzzolic: mixing fuzzing and concolic execution. Comput. Secur. 108 (2021). https://doi.org/10.1016/j.cose.2021.102368
3. Canavese, D., Regano, L., Basile, C.: Method for the identification of protected assets in software binaries (2021). https://www.knowledgeshare.eu/en/patent/method-for-the-identification-of-protected-assets-in-software-binaries/, application number 102021000012488
4. Ceccato, M., Di Penta, M., Falcarin, P., Ricca, F., Torchiano, M., Tonella, P.: A family of experiments to assess the effectiveness and efficiency of source code obfuscation techniques. Empir. Softw. Eng. 19(4), 1040–1074 (2013). https://doi.org/10.1007/s10664-013-9248-x
5. Daniel, L.A., Bardin, S., Rezk, T.: Hunting the haunter-efficient relational symbolic execution for spectre with haunted relse. In: Proceedings of NDSS 2021: Network and Distributed System Security Symposium, pp. 1–18. Virtual conference (2021). https://doi.org/10.14722/ndss.2021.24286