Author of the publication

Replacement attacks: automatically evading behavior-based software birthmark.

, , , , , , and . Int. J. Inf. Sec., 11 (5): 293-304 (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Replacement Attacks on Behavior Based Software Birthmark., , , , , , and . ISC, volume 7001 of Lecture Notes in Computer Science, page 1-16. Springer, (2011)Automatic construction of printable return-oriented programming payload., , , , and . MALWARE, page 18-25. IEEE Computer Society, (2014)Detect Android Malware Variants Using Component Based Topology Graph., , , , and . TrustCom, page 406-413. IEEE Computer Society, (2014)Research and application of Web network attack protection and block chain log storage based on software definition., , and . CITS, page 1-5. IEEE, (2020)BRICK: A Binary Tool for Run-Time Detecting and Locating Integer-Based Vulnerability., , , , and . ARES, page 208-215. IEEE Computer Society, (2009)Analytical Expression of the Mirror Coefficient by Joint Analytical Calculation Method., , , , , and . IEEE Trans. Ind. Informatics, 20 (4): 6119-6129 (April 2024)Replacement attacks: automatically evading behavior-based software birthmark., , , , , , and . Int. J. Inf. Sec., 11 (5): 293-304 (2012)Misleading Malware Similarities Analysis by Automatic Data Structure Obfuscation., , , , and . ISC, volume 6531 of Lecture Notes in Computer Science, page 181-195. Springer, (2010)Impeding behavior-based malware analysis via replacement attacks to malware specifications., , , , , and . J. Comput. Virol. Hacking Tech., 13 (3): 193-207 (2017)Kinematic Parameter Optimization of a Miniaturized Surgical Instrument Based on Dexterous Workspace Determination., , and . CoRR, (2021)