Cited By
View all- Wong MLanden MLi FMonrose FAhamad MKelley PKapadia A(2024)Comparing malware evasion theory with practiceProceedings of the Twentieth USENIX Conference on Usable Privacy and Security10.5555/3696899.3696903(61-80)Online publication date: 12-Aug-2024
- Yong Wong MValakuzhy KAhamad MBlough DMonrose F(2024)Understanding LLMs Ability to Aid Malware Analysts in Bypassing Evasion TechniquesCompanion Proceedings of the 26th International Conference on Multimodal Interaction10.1145/3686215.3690147(36-40)Online publication date: 4-Nov-2024
- Wang MZheng FLin JJiang FMa Y(2024)ZeroShield: Transparently Mitigating Code Page Sharing Attacks With Zero-Cost Stand-ByIEEE Transactions on Information Forensics and Security10.1109/TIFS.2024.343506219(7389-7403)Online publication date: 2024
- Show More Cited By