Cited By
View all- Mariano BWang ZPailoor SCollberg CDillig I(2024)Control-Flow Deobfuscation using Trace-Informed Compositional Program SynthesisProceedings of the ACM on Programming Languages10.1145/36897898:OOPSLA2(2211-2241)Online publication date: 8-Oct-2024
- Raubitzek SSchrittwieser SWimmer EMallinger K(2024)Obfuscation undercover: Unraveling the impact of obfuscation layering on structural code patternsJournal of Information Security and Applications10.1016/j.jisa.2024.10385085(103850)Online publication date: Sep-2024
- Wu LZhang HJiang S(2023)Design of a new detection system for anti-virtualization malicious code2023 International Conference on Networks, Communications and Intelligent Computing (NCIC)10.1109/NCIC61838.2023.00057(302-306)Online publication date: 17-Nov-2023
- Show More Cited By