Cited By
View all- Beierlieb LSchmitz ASpringer RDietrich CIffländer L(2025)Benchmarking Hyper-Breakpoints for Efficient Virtual Machine IntrospectionElectronics10.3390/electronics1403053414:3(534)Online publication date: 28-Jan-2025
- Vouvoutsis VCasino FPatsakis C(2025)Beyond the sandbox: Leveraging symbolic execution for evasive malware classificationComputers & Security10.1016/j.cose.2024.104193149(104193)Online publication date: Feb-2025
- Startzel CBrown DOwens Walker THill J(2025)Identifying Ransomware Functions Through Microarchitectural Side-Channel AnalysisScience of Cyber Security10.1007/978-981-96-2417-1_2(19-36)Online publication date: 4-Mar-2025
- Show More Cited By