|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 7 occurrences of 7 keywords
|
|
|
Results
Found 4 publication records. Showing 4 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
96 | John Aycock, Rennie deGraaf, Michael J. Jacobson Jr. |
Anti-disassembly using Cryptographic Hash Functions. |
J. Comput. Virol. |
2006 |
DBLP DOI BibTeX RDF |
Code armoring, Reverse-engineering, Hash function, Virus, Disassembly |
37 | Matthias Jacob, Mariusz H. Jakubowski, Ramarathnam Venkatesan |
Towards integral binary execution: implementing oblivious hashing using overlapped instruction encodings. |
MM&Sec |
2007 |
DBLP DOI BibTeX RDF |
anti-disassembly, oblivious hashing, overlapped code, obfuscation, tamper-resistance, integrity checking |
29 | John Aycock, Juan M. Gutiérrez Cárdenas, Daniel Medeiros Nunes de Castro |
Code Obfuscation Using Pseudo-random Number Generators. |
CSE (3) |
2009 |
DBLP DOI BibTeX RDF |
|
21 | Jason Raber, Eric Laspe |
Deobfuscator: An Automated Approach to the Identification and Removal of Code Obfuscation. |
WCRE |
2007 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #4 of 4 (100 per page; Change: )
|
|