Author:
Jamthagen Christopher,Lantz Patrik,Hell Martin
Cited by
6 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. CFGExplainer: Explaining Graph Neural Network-Based Malware Classification from Control Flow Graphs;2022 52nd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN);2022-06
2. Leave It to Weaver;Proceedings of the 8th Software Security, Protection, and Reverse Engineering Workshop on - SSPREW-8;2018
3. Analysis of Potential Code Vulnerabilities Involving Overlapping Instructions;Lecture Notes in Computer Science;2017
4. A Survey On Automated Dynamic Malware Analysis Evasion and Counter-Evasion;Proceedings of the 1st Reversing and Offensive-oriented Trends Symposium on - ROOTS;2017
5. Exploiting Trust in Deterministic Builds;Lecture Notes in Computer Science;2016