Author:
Slowinska Asia,Haller Istvan,Bacs Andrei,Baranga Silviu,Bos Herbert
Publisher
Springer International Publishing
Reference37 articles.
1. Codevirtualizer: Total obfuscations against reverse engineering (2008), http://oreans.com/codevirtualizer.php
2. Anckaert, B., Madou, M., De Sutter, B., De Bus, B., De Bosschere, K., Preneel, B.: Program obfuscation: a quantitative approach. In: Proc. of the 2007 ACM Workshop on Quality of Protection, QoP 2007 (2007)
3. Axelsson, S.: The base-rate fallacy and its implications for the difficulty of intrusion detection. In: Proc. of the 6th ACM Conference on Computer and Communications Security (1999)
4. Lecture Notes in Computer Science;B. Barak,2001
5. Ceccato, M., Di Penta, M., Nagra, J., Falcarin, P., Ricca, F., Torchiano, M., Tonella, P.: Towards experimental evaluation of code obfuscation techniques. In: Proc. of the 4th ACM Workshop on Quality of Protection (2008)
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. SoK;Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security;2019-07-02
2. Type Inference on Executables;ACM Computing Surveys;2016-05-02