1. A dictionary based approach to jpeg anti-forensics;Afshin,2016
2. Code obfuscation against symbolic execution attacks;Banescu,2016
3. A model and architecture for pseudo-random generation with applications to /dev/random;Barak,2005
4. Detecting covert timing channels with time-deterministic replay;Chen,2014
5. Advanced or not? A comparative study of the use of anti-debugging and anti-VM techniques in generic and targeted malware;Chen,2016