Author:
Xue Chao,Tang Zhanyong,Ye Guixin,Li Guanghui,Gong Xiaoqing,Wang Wei,Fang Dingyi,Wang Zheng
Cited by
4 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. The Instruction Separation Framework against Man-At-The-End Attacks: Protect What is Mattered On-the-Fly;2023 IEEE Intl Conf on Parallel & Distributed Processing with Applications, Big Data & Cloud Computing, Sustainable Computing & Communications, Social Computing & Networking (ISPA/BDCloud/SocialCom/SustainCom);2023-12-21
2. SoK: Automatic Deobfuscation of Virtualization-protected Applications;The 16th International Conference on Availability, Reliability and Security;2021-08-17
3. Techniques Implemented in Software Protectors: A Journey with DBI Through What Protectors Use to Detect Bad Guys;Advances in Intelligent Systems and Computing;2020-10-31
4. Reduction of Data Leakage Using Software Streaming;Communications in Computer and Information Science;2020