Author:
Stephens Jon,Yadegari Babak,Collberg Christian,Debray Saumya,Scheidegger Carlos
Cited by
5 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Value-utilized taint propagation: toward precise detection of apps’ information flows across Android API calls;International Journal of Information Security;2022-08-06
2. Flexible software protection;Computers & Security;2022-05
3. How to kill symbolic deobfuscation for free (or: unleashing the potential of path-oriented protections);Proceedings of the 35th Annual Computer Security Applications Conference;2019-12-09
4. How Does Malware Use RDTSC? A Study on Operations Executed by Malware with CPU Cycle Measurement;Detection of Intrusions and Malware, and Vulnerability Assessment;2019
5. Obfuscation;Proceedings of the 9th Workshop on Software Security, Protection, and Reverse Engineering - SSPREW9 '19;2019