![]() | ![]() |
2005 | ||
---|---|---|
2 | EE | Arun Lakhotia, Eric Uday Kumar, Michael Venable: A Method for Detecting Obfuscated Calls in Malicious Binaries. IEEE Trans. Software Eng. 31(11): 955-968 (2005) |
2004 | ||
1 | EE | Arun Lakhotia, Eric Uday Kumar: Abstracting Stack to Detect Obfuscated Calls in Binaries. SCAM 2004: 17-26 |
1 | Arun Lakhotia | [1] [2] |
2 | Michael Venable | [2] |