SymSem: Symbolic Execution with Time Stamps for Deobfuscation

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Inscrypt (15. : 2019 : Nanjing) Information security and cryptology
1. Verfasser: Li, Huayi (VerfasserIn)
Weitere Verfasser: Zhan, Yuanyuan (VerfasserIn), Jianqiang, Wang (VerfasserIn), Gu, Dawu (VerfasserIn)
Format: UnknownFormat
Sprache:eng
Veröffentlicht: 2020
Schlagworte:
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Titel Jahr Verfasser
Improving Division Property Based Cube Attacks by Removing Invalid Monomials 2020 Pan, Senshan
Revocable and Linkable Ring Signature 2020 Zhang, Xinyu
PPIDS: A Pyramid-Like Printer Intrusion Detection System Based on ATT&CK Framework 2020 He, Houhua
Certificateless Identity-Concealed Authenticated Encryption Under Multi-KGC 2020 Li, Chuang
Round-Efficient Anonymous Password-Authenticated Key Exchange Protocol in the Standard Model 2020 Zhang, Qihui
Improving ECDLP Computation in Characteristic 2 2020 Zhang, Fangguo
A SeqGAN-Based Method for Mimicking Attack 2020 Huang, Weiqing
Invisible Poisoning: Highly Stealthy Targeted Poisoning Attack 2020 Chen, Jinyin
A Privacy Enhancing Scheme for Mobile Devices Based Secure Multi-party Computation System 2020 Yang, Xueyi
Side-Channel Leakage of Alarm Signal for a Bulk-Current-Based Laser Sensor 2020 Li, Yang
Group Signatures with Decentralized Tracing 2020 Lu, Tingting
Linear Complexity of New q-ary Generalized Cyclotomic Sequences of Period 2pn 2020 Edemskiy, Vladimir
SymSem: Symbolic Execution with Time Stamps for Deobfuscation 2020 Li, Huayi
Attribute-Based Keyword Search from Lattices 2020 Li, Jie
Group Key Exchange from CSIDH and Its Application to Trusted Setup in Supersingular Isogeny Cryptosystems 2020 Moriya, Tomoki
Privacy-Preserving and yet Robust Collaborative Filtering Recommender as a Service 2020 Tang, Qiang
Consolidating Hash Power in Blockchain Shards with a Forest 2020 Zhao, Jun
A Lattice-Based Certificateless Public Key Encryption with Equality Test in Standard Model 2020 Duong, Dung Hoang
Evaluating the Cache Side Channel Attacks Against ECDSA 2020 Ma, Ziqiang
Efficient Identity-Based Outsider Anonymous Public-Key Trace and Revoke with Constant Ciphertext-Size and Fast Decryption 2020 Mandal, Mriganka
Alle Artikel auflisten