Cited By
View all- De Sutter BSchrittwieser SCoppens BKochberger P(2024)Evaluation Methodologies in Software Protection ResearchACM Computing Surveys10.1145/3702314Online publication date: 2-Nov-2024
- Faingnaert TVan Iseghem WDe Sutter BSchrittwieser SIanni M(2024)K-Hunt++: Improved Dynamic Cryptographic Key ExtractionProceedings of the 2024 Workshop on Research on offensive and defensive techniques in the context of Man At The End (MATE) attacks10.1145/3689934.3690818(22-29)Online publication date: 19-Nov-2024
- Damásio TCanesche MPacheco VBotacin MFaustino da Silva AQuintão Pereira FDubach CBruening DHardekopf B(2023)A Game-Based Framework to Compare Program Classifiers and EvadersProceedings of the 21st ACM/IEEE International Symposium on Code Generation and Optimization10.1145/3579990.3580012(108-121)Online publication date: 17-Feb-2023
- Show More Cited By