![]() |
| 2005 | ||
|---|---|---|
| 2 | EE | Michael Venable, Mohamed R. Chouchane, Md. Enamul Karim, Arun Lakhotia: Analyzing Memory Accesses in Obfuscated x86 Executables. DIMVA 2005: 1-18 |
| 1 | EE | Arun Lakhotia, Eric Uday Kumar, Michael Venable: A Method for Detecting Obfuscated Calls in Malicious Binaries. IEEE Trans. Software Eng. 31(11): 955-968 (2005) |
| 1 | Mohamed R. Chouchane | [2] |
| 2 | Md. Enamul Karim | [2] |
| 3 | Eric Uday Kumar | [1] |
| 4 | Arun Lakhotia | [1] [2] |