Cited By
View all- De Sutter BSchrittwieser SCoppens BKochberger P(2024)Evaluation Methodologies in Software Protection ResearchACM Computing Surveys10.1145/3702314Online publication date: 2-Nov-2024
- Lee JLee WMeng WJensen CCremers CKirda E(2023)Simplifying Mixed Boolean-Arithmetic Obfuscation by Program Synthesis and Term RewritingProceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security10.1145/3576915.3623186(2351-2365)Online publication date: 15-Nov-2023
- Tung YHarris I(2021)Zero Footprint Opaque Predicates: Synthesizing Opaque Predicates from Naturally Occurring InvariantsDetection of Intrusions and Malware, and Vulnerability Assessment10.1007/978-3-030-80825-9_15(299-318)Online publication date: 9-Jul-2021