Cited By
View all- Cosseron LRilling LSimonin MQuinson M(2024)Simulating the Network Environment of Sandboxes to Hide Virtual Machine Introspection PausesProceedings of the 17th European Workshop on Systems Security10.1145/3642974.3652280(1-7)Online publication date: 22-Apr-2024
- Sandborn MStoebner ZWeimer WForrest SDougherty RWhite JLeach K(2024)Reducing Malware Analysis Overhead With CoveringsIEEE Transactions on Dependable and Secure Computing10.1109/TDSC.2023.334632821:4(4133-4146)Online publication date: Jul-2024
- Feng CVon Der Assen JCeldran AMogicato RZermin AOk VBovet GStiller B(2024)SecBox: a Lightweight Data Mining Platform for Dynamic and Reproducible Malware Analysis2024 11th IEEE Swiss Conference on Data Science (SDS)10.1109/SDS60720.2024.00017(62-67)Online publication date: 30-May-2024
- Show More Cited By