共 33 条
[1]
[Anonymous], THESIS
[2]
[Anonymous], 2012, Practical malware analysis: the hands-on guide to dissecting malicious software
[3]
Code Obfuscation Against Symbolic Execution Attacks
[J].
32ND ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSAC 2016),
2016,
:189-200
[5]
Beaucamps P, 2010, LECT NOTES COMPUT SC, V6418, P168, DOI 10.1007/978-3-642-16612-9_14
[8]
Dahl GE, 2013, INT CONF ACOUST SPEE, P3422, DOI 10.1109/ICASSP.2013.6638293
[9]
David O.E., 2015, 2015 INT JOINT C NEU, P1, DOI DOI 10.1109/IJCNN.2015.7280815