Cited By
View all- Alrabaee SDebbabi MWang L(2022)A Survey of Binary Code Fingerprinting Approaches: Taxonomy, Methodologies, and FeaturesACM Computing Surveys10.1145/348686055:1(1-41)Online publication date: 17-Jan-2022
- Cheng BMing JFu JPeng GChen TZhang XMarion JLie DMannan MBackes MWang X(2018)Towards Paving the Way for Large-Scale Windows Malware AnalysisProceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security10.1145/3243734.3243771(395-411)Online publication date: 15-Oct-2018
- Jacobson EBernat AWilliams WMiller B(2014)Detecting Code Reuse Attacks with a Model of Conformant Program ExecutionProceedings of the 6th International Symposium on Engineering Secure Software and Systems - Volume 836410.1007/978-3-319-04897-0_1(1-18)Online publication date: 26-Feb-2014
- Show More Cited By