Author:
Andriesse Dennis,Bos Herbert
Publisher
Springer International Publishing
Reference20 articles.
1. CWE-457: Use of Uninitialized Variable. Vulnerability description,
http://cwe.mitre.org/data/definitions/457.html
2. ProFTPD Backdoor (2010),
http://www.securityfocus.com/bid/45150
3. Horde Groupware Trojan Horse (2012),
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2012-0209
4. Collberg, C., Thomborson, C., Low, D.: Manufacturing Cheap, Resilient, and Stealthy Opaque Constructs. In: Proceedings of the 25th ACM Symposium on Principles of Programming Languages (PoPL 1998) (1998)
5. Lecture Notes in Computer Science;M.D. Preda,2006
Cited by
13 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Framework for Malware Triggering Using Steganography;Applied Sciences;2022-08-16
2. Data Hiding Using Code Obfuscation;The 16th International Conference on Availability, Reliability and Security;2021-08-17
3. Bitcoin Blockchain Steganographic Analysis;Lecture Notes in Computer Science;2020
4. CAVAEva: An Engineering Platform for Evaluating Commercial Anti-malware Applications on Smartphones;Information Security and Cryptology;2020
5. The ROP needle;Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing;2019-04-08