Cited By
View all- Zhao LShuang HXu SHuang WCui RBettadpur PLie D(2024)A Survey of Hardware Improvements to Secure Program ExecutionACM Computing Surveys10.1145/367239256:12(1-37)Online publication date: 12-Jun-2024
- Zhang PWu CPeng MZeng KYu DLai YKang YWang WWang ZDubach CBruening DHardekopf B(2023)Khaos: The Impact of Inter-procedural Code Obfuscation on Binary Diffing TechniquesProceedings of the 21st ACM/IEEE International Symposium on Code Generation and Optimization10.1145/3579990.3580007(55-67)Online publication date: 17-Feb-2023
- Verma RRane DJha RIbrahim W(2022)Next-Generation Optimization Models and Algorithms in Cloud and Fog Computing Virtualization SecurityScientific Programming10.1155/2022/24192912022Online publication date: 1-Jan-2022
- Show More Cited By