搜索历史记录选项已关闭,请开启搜索历史记录选项。
作者: Yousra Aafer , Wenliang Du , Heng Yin
DOI:
关键词:
摘要: … Bytecode Encryption: To prevent reverse engineering of Java code, malware authors may encrypt their code and allow the decryption at runtime. Our tool considers decryption APIs as a …
cryptology and network security,2014, 引用: 62
International Symposium on Cyberspace Safety and Security,2013, 引用: 0
international conference on detection of intrusions and malware, and vulnerability assessment,2014, 引用: 16
european symposium on research in computer security,2014, 引用: 282
Space,2014, 引用: 7
engineering secure software and systems,2015, 引用: 83
,2013, 引用: 24
international conference on advanced communication technology,2015, 引用: 8
2015 IEEE International Conference on Software Quality, Reliability and Security,2015, 引用: 16
computer software and applications conference,2015, 引用: 125