Cited By
View all- Li YCai JBao YChung Y(2023)What you can read is what you can't executeComputers & Security10.1016/j.cose.2023.103377(103377)Online publication date: Jul-2023
- Wang HWang SXu DZhang XLiu X(2022)Generating Effective Software Obfuscation Sequences With Reinforcement LearningIEEE Transactions on Dependable and Secure Computing10.1109/TDSC.2020.304165519:3(1900-1917)Online publication date: 1-May-2022
- Yu JGe XJaeger TFletcher CCui W(2022)Pagoda: Towards Binary Code Privacy Protection with SGX-based Execute-Only Memory2022 IEEE International Symposium on Secure and Private Execution Environment Design (SEED)10.1109/SEED55351.2022.00019(133-144)Online publication date: Sep-2022
- Show More Cited By