Yu-Jye Tung (University of California, Irvine), Ian Harris (University of California Irvine)
A Heuristic Approach to Detect Opaque Predicates that Disrupt Static Disassembly
View More Papers
FCGAT: Interpretable Malware Classification Method using Function Call Graph...
Minami Someya (Institute of Information Security), Yuhei Otsubo (National Police Academy), Akira Otsuka (Institute of Information Security)
Read MoreInvestigating Graph Embedding Neural Networks with Unsupervised Features Extraction...
Luca Massarelli (Sapienza University of Rome), Giuseppe A. Di Luna (CINI - National Laboratory of Cybersecurity), Fabio Petroni (Independent Researcher), Leonardo Querzoni (Sapienza University of Rome), Roberto Baldoni (Italian Presidency of Ministry Council)
Read Morepodft: On Accelerating Dynamic Taint Analysis with Precise Path...
Zhiyou Tian (Xidian University), Cong Sun (Xidian University), Dongrui Zeng (Palo Alto Networks), Gang Tan (Pennsylvania State University)
Read MoreNo Source Code? No Problem! Twenty Years of Research...
Jack W. Davidson, Professor of Computer Science in the School of Engineering and Applied Science, University of Virginia
Read More