Author:
Wu Zhenyu,Gianvecchio Steven,Xie Mengjun,Wang Haining
Cited by
35 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Obfuscation undercover: Unraveling the impact of obfuscation layering on structural code patterns;Journal of Information Security and Applications;2024-09
2. Modeling Obfuscation Stealth Through Code Complexity;Lecture Notes in Computer Science;2024
3. On Plagiarism and Software Plagiarism;Communications in Computer and Information Science;2024
4. Cornucopia : A Framework for Feedback Guided Generation of Binaries;Proceedings of the 37th IEEE/ACM International Conference on Automated Software Engineering;2022-10-10
5. Deceiving Deep Neural Networks-Based Binary Code Matching with Adversarial Programs;2022 IEEE International Conference on Software Maintenance and Evolution (ICSME);2022-10