![]() |
| 2005 | ||
|---|---|---|
| 2 | EE | Arun Lakhotia, Eric Uday Kumar, Michael Venable: A Method for Detecting Obfuscated Calls in Malicious Binaries. IEEE Trans. Software Eng. 31(11): 955-968 (2005) |
| 2004 | ||
| 1 | EE | Arun Lakhotia, Eric Uday Kumar: Abstracting Stack to Detect Obfuscated Calls in Binaries. SCAM 2004: 17-26 |
| 1 | Arun Lakhotia | [1] [2] |
| 2 | Michael Venable | [2] |