ESORICS   2011 European Symposium on Research in Computer Security
Wall of Fame | Most Viewed ESORICS-2011 Paper
9 years 6 months ago
Linear Obfuscation to Combat Symbolic Execution
Abstract. Trigger-based code (malicious in many cases, but not necessarily) only executes when speciļ¬c inputs are received. Symbolic execution has been one of the most powerful t...
Zhi Wang, Jiang Ming, Chunfu Jia, Debin Gao
Disclaimer and Copyright Notice
Sciweavers respects the rights of all copyright holders and in this regard, authors are only allowed to share a link to their preprint paper on their own website. Every contribution is associated with a desciptive image. It is the sole responsibility of the authors to ensure that their posted image is not copyright infringing. This service is compliant with IEEE copyright.
1Download preprint from source205
2Download preprint from source199
3Download preprint from source193
4Download preprint from source191
5Download preprint from source191
6Download preprint from source178
7Download preprint from source173
8Download preprint from source170
9Download preprint from source166
10Download preprint from source161
11Download preprint from source157
12Download preprint from source140