Cited By
View all- Vouvoutsis VCasino FPatsakis C(2025)Beyond the sandbox: Leveraging symbolic execution for evasive malware classificationComputers & Security10.1016/j.cose.2024.104193149(104193)Online publication date: Feb-2025
- Yi XLi GLi JDing A(2024)RepFTI: Representation-Fused Function-Type Inference for Vehicular Secure Software SystemsApplied Sciences10.3390/app1411450214:11(4502)Online publication date: 24-May-2024
- Shen QMeng GChen K(2024)Revealing the exploitability of heap overflow through PoC analysisCybersecurity10.1186/s42400-024-00244-67:1Online publication date: 18-Jul-2024
- Show More Cited By