Showing
1 - 12
results of
12
for search '
JIA Chunfu,
'
Skip to content
VuFind
Feedback
Your Account
Log Out
Login
Theme
Bootstrap
Aunilo
Language
English
中文(繁體)
اللغة العربية
All Fields
Title
Author
Subject
Call Number
ISBN/ISSN
Tag
Find
Advanced
Author
JIA Chunfu,
Export Ready —
Showing
1 - 12
results of
12
for search '
JIA Chunfu,
'
, query time: 0.02s
Refine Results
Sort
Relevance
Date Descending
Date Ascending
Call Number
Author
Title
1
Linear Obfuscation to Combat Symbolic Execution
by
WANG, Zhi
,
Ming, Jiang
,
Jia
,
Chunfu
,
GAO, Debin
Published 2011
Get full text
Get full text
text
Save to List
Saved in:
2
Walls have ears: Eavesdropping user behaviors via graphics-interrupt-based side channel
by
MA, Haoyu
,
TIAN, Jianwen
,
GAO, Debin
,
JIA
Chunfu
Published 2020
Get full text
Get full text
text
Save to List
Saved in:
3
Secure repackage-proofing framework for Android apps using Collatz conjecture
by
MA, Haoyu
,
LI, Shijia
,
GAO, Debin
,
JIA
,
Chunfu
Published 2021
Get full text
Get full text
text
Save to List
Saved in:
4
On the effectiveness of using graphics interrupt as a side channel for user behavior snooping
by
MA, Haoyu
,
TIAN, Jianwen
,
GAO, Debin
,
JIA
,
Chunfu
Published 2022
Get full text
Get full text
text
Save to List
Saved in:
5
Denial-of-Service Attacks on Host-Based Generic Unpackers
by
LIU, Limin
,
MING, Jiang
,
WANG, Zhi
,
GAO, Debin
,
JIA
,
Chunfu
Published 2009
Get full text
Get full text
text
Save to List
Saved in:
6
Integrated software fingerprinting via neural-network-based control flow obfuscation
by
MA, Haoyu
,
LI, Ruiqi
,
YU, Xiaoxu
,
JIA
,
Chunfu
,
GAO, Debin
Published 2016
Get full text
Get full text
text
Save to List
Saved in:
7
Software Watermarking using Return-Oriented Programming
by
Ma, Haoyu
,
Lu, Kangjie
,
Ma, Xinjie
,
Zhang, Haining
,
Jia
,
Chunfu
,
GAO, Debin
Published 2015
Get full text
Get full text
text
Save to List
Saved in:
8
Control Flow Obfuscation using Neural Network to Fight Concolic Testing
by
Ma, Haoyu
,
Ma, Xinjie
,
Liu, Weijie
,
Huang, Zhipeng
,
GAO, Debin
,
Jia
,
Chunfu
Published 2014
Get full text
Get full text
text
Save to List
Saved in:
9
Chosen-instruction attack against commercial code virtualization obfuscators
by
LI, Shijia
,
JIA
,
Chunfu
,
QIU, Pengda
,
CHEN, Qiyuan
,
MING, Jiang
,
GAO, Debin
Published 2022
Get full text
Get full text
text
Save to List
Saved in:
10
Active warden attack: On the (in)effectiveness of Android app repackage-proofing
by
MA, Haoyu
,
LI, Shijia
,
GAO, Debin
,
WU, Daoyuan
,
JIA, Qiaowen
,
JIA
,
Chunfu
Published 2022
Get full text
Get full text
text
Save to List
Saved in:
11
Deep-learning-based app sensitive behavior surveillance for Android powered cyber-physical systems
by
MA, Haoyu
,
TIAN, Jianwen
,
QIU, Kefan
,
LO, David
,
GAO, Debin
,
WU, Daoyuan
,
JIA
,
Chunfu
,
BAKER, Thar
Published 2020
Get full text
Get full text
text
Save to List
Saved in:
12
Stack Layout Randomization with Minimal Rewriting of Android Binaries
by
Liang, Yu
,
Ma, Xinjie
,
Wu, Daoyuan
,
Tang, Xiaoxiao
,
GAO, Debin
,
Peng, Guojun
,
Jia
,
Chunfu
,
Zhang, Huanguo
Published 2015
Get full text
Get full text
text
Save to List
Saved in:
Search Tools:
Get RSS Feed
—
Email this Search
—
×
Loading...