Cited By
View all- Viglianisi GCarminati MPolino MContinella AZanero SMcDonald JBardin SStakhanova N(2018)SysTaintProceedings of the 8th Software Security, Protection, and Reverse Engineering Workshop10.1145/3289239.3289245(1-12)Online publication date: 3-Dec-2018
- Chau SWang BWang JChowdhury OKate ALi N(2018)Why Johnny Can't Make Money With His ContentsProceedings of the 34th Annual Computer Security Applications Conference10.1145/3274694.3274752(236-251)Online publication date: 3-Dec-2018
- Li JLin ZCaballero JZhang YGu DLie DMannan MBackes MWang X(2018)K-HuntProceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security10.1145/3243734.3243783(412-425)Online publication date: 15-Oct-2018
- Show More Cited By