Cited By
View all- Faingnaert TVan Iseghem WDe Sutter BSchrittwieser SIanni M(2024)K-Hunt++: Improved Dynamic Cryptographic Key ExtractionProceedings of the 2024 Workshop on Research on offensive and defensive techniques in the context of Man At The End (MATE) attacks10.1145/3689934.3690818(22-29)Online publication date: 19-Nov-2024
- Faingnaert TZhang TVan Iseghem WEveraert GCoppens BCollberg CDe Sutter BSchrittwieser SIanni M(2024)Tools and Models for Software Reverse Engineering ResearchProceedings of the 2024 Workshop on Research on offensive and defensive techniques in the context of Man At The End (MATE) attacks10.1145/3689934.3690817(44-58)Online publication date: 19-Nov-2024
- Mariano BWang ZPailoor SCollberg CDillig I(2024)Control-Flow Deobfuscation using Trace-Informed Compositional Program SynthesisProceedings of the ACM on Programming Languages10.1145/36897898:OOPSLA2(2211-2241)Online publication date: 8-Oct-2024
- Show More Cited By