共 17 条
- [11] Wang Z., Jia C., Liu W., Et al., Branch obfuscation to combat symbolic execution, Acta Electronica Sinica, 43, 5, pp. 870-878, (2015)
- [12] Lin H., Zhang X., Ma Y., Et al., Branch obfuscation using binary code side effects, Proc of the 1st Int Conf on Computer, Networks and Communication Engineering (ICCNCE 2013), (2013)
- [13] Banescu S., Collberg C., Pretschner A., Predicting the resilience of obfuscated code against symbolic execution attacks via machine learning, Proc of the 26th USENIX Security Symposium (USENIX Security 17), pp. 661-678, (2017)
- [14] Avidan E., Feitelson D.G., From obfuscation to comprehension, Proc of the 23rd Int Conf on Program Comprehension, pp. 178-181, (2015)
- [15] Yadegari B., Debray S., Symbolic execution of obfuscated code, Proc of the 22nd ACM SIGSAC Conf on Computer and Communications Security, pp. 732-744, (2015)
- [16] Banescu S., Collberg C., Ganesh V., Et al., Code obfuscation against symbolic execution attacks, Proc of the 32nd Annual Conf on Computer Security Applications, pp. 189-200, (2016)
- [17] Fan J., Xu J., Amma M.H., Et al., Prefix-preserving IP address anonymization: Measurement-based security evaluation and a new cryptography-based scheme, Computer Networks, 46, 2, pp. 253-272, (2004)