Cited By
View all- Holder WMcDonald JAndel TMcDonald JPreda MStakhanova N(2017)Evaluating Optimal Phase Ordering in Obfuscation ExecutivesProceedings of the 7th Software Security, Protection, and Reverse Engineering / Software Security and Protection Workshop10.1145/3151137.3151140(1-12)Online publication date: 5-Dec-2017
- Salem ABanescu SMcDonald JPreda MStakhanova N(2016)Metadata recovery from obfuscated programs using machine learningProceedings of the 6th Workshop on Software Security, Protection, and Reverse Engineering10.1145/3015135.3015136(1-11)Online publication date: 5-Dec-2016
- Banescu SLucaci CKrämer BPretschner AWyseur BDe Sutter B(2016)VOT4CSProceedings of the 2016 ACM Workshop on Software PROtection10.1145/2995306.2995312(39-49)Online publication date: 28-Oct-2016
- Show More Cited By