Cited By
View all- Huang GChang KLai T(2024)Chaotic-Based Shellcode Encryption: A New Strategy for Bypassing Antivirus MechanismsSymmetry10.3390/sym1611152616:11(1526)Online publication date: 14-Nov-2024
- De Pasquale GNakanishi FFerla DCavallaro L(2023)ROPfuscator: Robust Obfuscation with ROP2023 IEEE Security and Privacy Workshops (SPW)10.1109/SPW59333.2023.00026(1-10)Online publication date: May-2023
- Yang GLiu XTang C(2022)Horus: An Effective and Reliable Framework for Code-Reuse Exploits Detection in Data StreamElectronics10.3390/electronics1120336311:20(3363)Online publication date: 18-Oct-2022
- Show More Cited By