Cited By
View all- Pizzolotto DBerlato SCeccato M(2024)Mitigating Debugger-based Attacks to Java Applications with Self-debuggingACM Transactions on Software Engineering and Methodology10.1145/363197133:4(1-38)Online publication date: 18-Apr-2024
- Vasileiadis LCeccato MCorradini DMcDonald JBardin SStakhanova N(2019)Revealing malicious remote engineering attempts on Android apps with magic numbersProceedings of the 9th Workshop on Software Security, Protection, and Reverse Engineering10.1145/3371307.3371312(1-12)Online publication date: 9-Dec-2019
- Kim SLee DPark J(2018)Efficient scheme of verifying integrity of application binaries in embedded operating systemsThe Journal of Supercomputing10.1007/s11227-010-0465-459:2(676-692)Online publication date: 31-Dec-2018
- Show More Cited By