"A Method for Detecting Obfuscated Calls in Malicious Binaries."

Arun Lakhotia, Eric Uday Kumar, Michael Venable (2005)

Details and statistics

DOI: 10.1109/TSE.2005.120

access: closed

type: Journal Article

metadata version: 2021-10-14

a service of  Schloss Dagstuhl - Leibniz Center for Informatics