2013 conference paper
Fast, scalable detection of "piggybacked" mobile applications
ACM Conference on Data and Application Security and Privacy, 185–195.
2010 conference paper
DKSM: Subverting virtual machine introspection for fun and profit
2010 29th ieee international symposium on reliable distributed systems srds 2010, 82–91.
2009 conference paper
ReFormat: Automatic reverse engineering of encrypted messages
Computer security - esorics 2009, proceedings, 5789, 200–215.
Citation Index includes data from a number of different sources. If you have questions about the sources of data in the Citation Index or need a set of data which is free to re-distribute, please contact us.
Certain data included herein are derived from the Web of Science© and InCites© (2024) of Clarivate Analytics. All rights reserved. You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.