Showing results 2 to 2 of 2
Identifying Input-Dependent Jumps from Obfuscated Execution using Dynamic Data Flow Graphs Hwang, Joonhyung; Han, Tai-Sook, Software Security, Protection, and Reverse Engineering Workshop, pp.3:1 - 3:12, Association for Computing Machinery, 2018-12-04 |
Discover