Author:
Lee Jae-Yung,Suk Jae Hyuk,Lee Dong Hoon
Publisher
Springer International Publishing
Reference23 articles.
1. Banescu, S., Collberg, C., Pretschner, A.: Predicting the resilience of obfuscated code against symbolic execution attacks via machine learning. In: Proceedings of the 26th USENIX Security Symposium (2017)
2. Wang, H., Fang, D., Li, G., Yin, X., Zhang, B., Gu, Y.: NISLVMP: improved virtual machine-based software protection. In: 2013 9th International Conference on Computational Intelligence and Security (CIS), pp. 479–483. IEEE (2013)
3. Averbuch, A., Kiperberg, M., Zaidenberg, N.J.: Truly-protect: an efficient VM-based software protection. IEEE Syst. J. 7(3), 455–466 (2013)
4. Kuang, K., Tang, Z., Gong, X., Fang, D., Chen, X., Wang, Z.: Enhance virtual-machine-based code obfuscation security through dynamic bytecode scheduling. Comput. Secur. 74, 202–220 (2018)
5. Collberg, C., Thomborson, C., Low, D.: A taxonomy of obfuscating transformations. Technical report, Department of Computer Science, The University of Auckland, New Zealand (1997)
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献