Cited By
View all- Sandborn MStoebner ZWeimer WForrest SDougherty RWhite JLeach K(2024)Reducing Malware Analysis Overhead With CoveringsIEEE Transactions on Dependable and Secure Computing10.1109/TDSC.2023.334632821:4(4133-4146)Online publication date: Jul-2024
- D'Elia DNicchi SMariani MMarini MPalmaro F(2023)Designing Robust API Monitoring SolutionsIEEE Transactions on Dependable and Secure Computing10.1109/TDSC.2021.313372920:1(392-406)Online publication date: 1-Jan-2023
- Nechta I(2022)Method for Programs Protection against Breakpoints by Code Fragments Execution in a Shared BufferThe Herald of the Siberian State University of Telecommunications and Informatics10.55648/1998-6920-2022-16-3-48-55(48-55)Online publication date: 1-Oct-2022
- Show More Cited By