Personensuche
X
?
E-Business and Telecommunications; Communications in Computer and Information Science ,
3
Explaining the Use of Cryptographic API in Android Malware:
, In:
?
Computer Security – ESORICS 2022; Lecture Notes in Computer Science ,
4
Reach Me if You Can: On Native Vulnerability Reachability i..:
, In:
?
Detection of Intrusions and Malware, and Vulnerability Assessment; Lecture Notes in Computer Science ,
5
Extended Abstract: Effective Call Graph Fingerprinting for ..:
, In:
?
Detection of Intrusions and Malware, and Vulnerability Assessment; Lecture Notes in Computer Science ,
9
PowerDrive: Accurate De-obfuscation and Analysis of PowerSh..:
, In:
?
Proceedings of the Symposium on Applied Computing ,
15