Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Structural attack against graph based android malware detection
Malware detection techniques achieve great success with deeper insight into the semantics
of malware. Among existing detection techniques, function call graph (FCG) based methods …
of malware. Among existing detection techniques, function call graph (FCG) based methods …
Syztrust: State-aware fuzzing on trusted os designed for iot devices
Trusted Execution Environments (TEEs) embedded in IoT devices provide a deployable
solution to secure IoT applications at the hardware level. By design, in TEEs, the Trusted …
solution to secure IoT applications at the hardware level. By design, in TEEs, the Trusted …
NCScope: hardware-assisted analyzer for native code in android apps
More and more Android apps implement their functionalities in native code, so does
malware. Although various approaches have been designed to analyze the native code …
malware. Although various approaches have been designed to analyze the native code …
Framework for understanding intention-unbreakable malware
T Ji, B Fang, X Cui, Z Wang, P Liao, S Song - Science China Information …, 2023 - Springer
The anti-analysis technology of malware has always been the focus in the cyberspace
security field. As malware analysis techniques evolve, malware writers continually employ …
security field. As malware analysis techniques evolve, malware writers continually employ …
Hyperdbg: Reinventing hardware-assisted debugging
Software analysis, debugging, and reverse engineering have a crucial impact in today's
software industry. Efficient and stealthy debuggers are especially relevant for malware …
software industry. Efficient and stealthy debuggers are especially relevant for malware …
Armor: Protecting Software Against Hardware Tracing Techniques
Many modern processors have embedded hardware tracing techniques (eg, Intel Processor
Trace or ARM CoreSight). While these techniques are widely used due to their transparency …
Trace or ARM CoreSight). While these techniques are widely used due to their transparency …
On the feasibility of malware unpacking via hardware-assisted loop profiling
Hardware Performance Counters (HPCs) are built-in registers of modern processors to
count the occurrences of various micro-architectural events. Measuring HPCs values is a …
count the occurrences of various micro-architectural events. Measuring HPCs values is a …
An empirical study of smart contract decompilers
X Liu, B Hua, Y Wang, Z Pan - 2023 IEEE international …, 2023 - ieeexplore.ieee.org
Smart contract decompilers, converting smart contract bytecode into smart contract source
code, have been used extensively in many scenarios such as binary code analysis, reverse …
code, have been used extensively in many scenarios such as binary code analysis, reverse …
Attention! your copied data is under monitoring: a systematic study of clipboard usage in android apps
Recently, clipboard usage has become prevalent in mobile apps allowing users to copy and
paste text within the same app or across different apps. However, insufficient access control …
paste text within the same app or across different apps. However, insufficient access control …
Hybrid Dynamic Analysis for Android Malware Protected by Anti-Analysis Techniques with DOOLDA
A lot of the recently reported malware is equipped with the anti-analysis techniques (eg, anti-
emulation, anti-debugging, etc.) for preventing from being the analyzed, which can delay …
emulation, anti-debugging, etc.) for preventing from being the analyzed, which can delay …