共 50 条
- [41] A Security Model and Implementation of Embedded Software Based on Code Obfuscation 2020 IEEE 19TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2020), 2020, : 1606 - 1613
- [42] Exploiting Dynamic Scheduling for VM-Based Code Obfuscation 2016 IEEE TRUSTCOM/BIGDATASE/ISPA, 2016, : 489 - 496
- [44] Binary obfuscation using signals USENIX ASSOCIATION PROCEEDINGS OF THE 16TH USENIX SECURITY SYMPOSIUM, 2007, : 275 - 290
- [45] Research on Decoding QR Code based on Image Processing Technology PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON ADVANCES IN MECHANICAL ENGINEERING AND INDUSTRIAL INFORMATICS, 2015, 15 : 1614 - 1620
- [46] WASMixer: Binary Obfuscation for WebAssembly COMPUTER SECURITY-ESORICS 2024, PT III, 2024, 14984 : 88 - 109
- [47] The malicious code hiding techniques, code obfuscation problem 12TH IEEE INTERNATIONAL CONFERENCE ON EMERGING ELEARNING TECHNOLOGIES AND APPLICATIONS (ICETA 2014), 2014, : 181 - 185
- [49] Following the Obfuscation Trail: Identifying and Exploiting Obfuscation Signatures in Malicious Code FOUNDATIONS AND PRACTICE OF SECURITY, PT I, FPS 2023, 2024, 14551 : 321 - 338
- [50] Control flow obfuscation technology based on random insertion Sun, Yongyong (yongsunjd@126.com), 1600, Universidad Central de Venezuela (55):