共 50 条
- [21] Khaos: The Impact of Inter-procedural Code Obfuscation on Binary Diffing Techniques PROCEEDINGS OF THE 21ST ACM/IEEE INTERNATIONAL SYMPOSIUM ON CODE GENERATION AND OPTIMIZATION, CGO 2023, 2023, : 55 - 67
- [22] Obfuscation: Maze of Code 2017 2ND INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS, COMPUTING AND IT APPLICATIONS (CSCITA), 2017, : 11 - 16
- [23] Semantics-Based Obfuscation-Resilient Binary Code Similarity Comparison with Applications to Software Plagiarism Detection 22ND ACM SIGSOFT INTERNATIONAL SYMPOSIUM ON THE FOUNDATIONS OF SOFTWARE ENGINEERING (FSE 2014), 2014, : 389 - 400
- [24] Obfuscation procedure based in Dead Code insertion into Crypter 2016 6TH INTERNATIONAL CONFERENCE ON COMPUTERS COMMUNICATIONS AND CONTROL (ICCCC), 2016, : 23 - 29
- [25] Semantic-based code obfuscation by abstract interpretation AUTOMATA, LANGUAGES AND PROGRAMMING, PROCEEDINGS, 2005, 3580 : 1325 - 1336
- [26] Trust Evaluation Method Based on the Degree of Code Obfuscation SMART COMPUTING AND COMMUNICATION, 2022, 13202 : 164 - 174
- [28] Obfuscation Code Localization Based on CFG Generation of Malware FOUNDATIONS AND PRACTICE OF SECURITY (FPS 2015), 2016, 9482 : 229 - 247
- [29] A Code Encrypt Technique Based on Branch Condition Obfuscation Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2019, 56 (10): : 2183 - 2192
- [30] Explaining Binary Obfuscation 2023 IEEE INTERNATIONAL CONFERENCE ON CYBER SECURITY AND RESILIENCE, CSR, 2023, : 22 - 27