Cited By
View all- Cheng BLeal EZhang HMing JCalandrino JTroncoso C(2023)On the feasibility of malware unpacking via hardware-assisted loop profilingProceedings of the 32nd USENIX Conference on Security Symposium10.5555/3620237.3620656(7481-7498)Online publication date: 9-Aug-2023
- Rattanavipanon NPonnoprat DOchiai HTantayakul KAngchuan TKamolphiwong S(2022)Detecting Anomalous LAN Activities under Differential PrivacySecurity and Communication Networks10.1155/2022/14032002022Online publication date: 1-Jan-2022
- Muralidharan TCohen AGerson NNissim N(2022)File Packing from the Malware Perspective: Techniques, Analysis Approaches, and Directions for EnhancementsACM Computing Surveys10.1145/353081055:5(1-45)Online publication date: 3-Dec-2022
- Show More Cited By