2005 | ||
---|---|---|
2 | EE | Michael Venable, Mohamed R. Chouchane, Md. Enamul Karim, Arun Lakhotia: Analyzing Memory Accesses in Obfuscated x86 Executables. DIMVA 2005: 1-18 |
1 | EE | Arun Lakhotia, Eric Uday Kumar, Michael Venable: A Method for Detecting Obfuscated Calls in Malicious Binaries. IEEE Trans. Software Eng. 31(11): 955-968 (2005) |
1 | Mohamed R. Chouchane | [2] |
2 | Md. Enamul Karim | [2] |
3 | Eric Uday Kumar | [1] |
4 | Arun Lakhotia | [1] [2] |