共 50 条
- [31] Memory Trace Oblivious Program Execution 2013 IEEE 26TH COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF), 2013, : 51 - 65
- [32] Measuring the inconsistencies between process model and process execution CHINESE JOURNAL OF ELECTRONICS, 2007, 16 (02): : 223 - 226
- [35] Arbitrary Control-Flow Embedding into Multiple Threads for Obfuscation: A Preliminary Complexity and Performance Analysis SCC'14: PROCEEDINGS OF THE 2ND INTERNATIONAL WORKSHOP ON SECURITY IN CLOUD COMPUTING, 2014, : 51 - 58
- [36] HEXON: Protecting Firmware Using Hardware-Assisted Execution-Level Obfuscation 2021 IEEE COMPUTER SOCIETY ANNUAL SYMPOSIUM ON VLSI (ISVLSI 2021), 2021, : 343 - 349
- [37] Stealth Loader: Trace-Free Program Loading for API Obfuscation RESEARCH IN ATTACKS, INTRUSIONS, AND DEFENSES (RAID 2017), 2017, 10453 : 217 - 237
- [38] TRADEOFFS BETWEEN MODEL ABSTRACTION, EXECUTION SPEED, AND BEHAVIORAL ACCURACY INTERNATIONAL MEDITERRANEAN MODELLING MULTICONFERENCE 2006, 2006, : 13 - 18
- [39] A trace compression approach for predicative execution processor Gao, Y. (gaoyingke@126.com), 1918, Institute of Computing Technology (25):
- [40] Toward an Execution Trace Standard: An MDE Approach COMPUTER SCIENCE - CACIC 2022, 2023, 1778 : 91 - 106