Author:
Crane Stephen,Larsen Per,Brunthaler Stefan,Franz Michael
Cited by
34 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Generation of Believable Fake Logic Circuits for Cyber Deception;2024 16th International Conference on COMmunication Systems & NETworkS (COMSNETS);2024-01-03
2. Space Booby Traps: Hacking Back and Assured Cyber Deterrence in Space;2023 IEEE International Conference on Assured Autonomy (ICAA);2023-06
3. R2C: AOCR-Resilient Diversity with Reactive and Reflective Camouflage;Proceedings of the Eighteenth European Conference on Computer Systems;2023-05-08
4. One size does not fit all: security hardening of MIPS embedded systems via static binary debloating for shared libraries;Proceedings of the 27th ACM International Conference on Architectural Support for Programming Languages and Operating Systems;2022-02-22
5. Resilient User-Side Android Application Repackaging and Tampering Detection Using Cryptographically Obfuscated Logic Bombs;IEEE Transactions on Dependable and Secure Computing;2021-11-01