Cited By
View all- De Sutter BSchrittwieser SCoppens BKochberger P(2024)Evaluation Methodologies in Software Protection ResearchACM Computing Surveys10.1145/3702314Online publication date: 2-Nov-2024
- Pizzolotto DBerlato SCeccato M(2024)Mitigating Debugger-based Attacks to Java Applications with Self-debuggingACM Transactions on Software Engineering and Methodology10.1145/363197133:4(1-38)Online publication date: 18-Apr-2024
- Kasuya RYoshiura N(2023)Obfuscating LLVM IR with the Application of Lambda CalculusIntelligent Information and Database Systems10.1007/978-981-99-5837-5_3(27-39)Online publication date: 5-Sep-2023
- Show More Cited By