Author of the publication

Stealth Loader: Trace-Free Program Loading for API Obfuscation.

, , , , and . RAID, volume 10453 of Lecture Notes in Computer Science, page 217-237. Springer, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

API Chaser: Taint-Assisted Sandbox for Evasive Malware Analysis., , , and . J. Inf. Process., (2019)Stealth Loader: Trace-Free Program Loading for API Obfuscation., , , , and . RAID, volume 10453 of Lecture Notes in Computer Science, page 217-237. Springer, (2017)Analyzing the Use of Public and In-house Secure Development Guidelines in U.S. and Japanese Industries., , , and . CHI, page 187:1-187:17. ACM, (2023)Code shredding: byte-granular randomization of program layout for detecting code-reuse attacks., , , and . ACSAC, page 309-318. ACM, (2012)API Chaser: Anti-analysis Resistant Malware Analyzer., , , and . RAID, volume 8145 of Lecture Notes in Computer Science, page 123-143. Springer, (2013)Addressing the Privacy Threat to Identify Existence of a Target's Account on Sensitive Services., , , , and . J. Inf. Process., (2020)A Cross-role and Bi-national Analysis on Security Efforts and Constraints of Software Development Projects., , , and . ACSAC, page 349-364. ACM, (2021)Understanding the security management of global third-party Android marketplaces., , , , , , , , and . WAMA@ESEC/SIGSOFT FSE, page 12-18. ACM, (2017)I know what you did last login: inconsistent messages tell existence of a target's account to insiders., , , and . ACSAC, page 732-746. ACM, (2019)Vulnerability of MRD-Code-based Universal Secure Network Coding against Stronger Eavesdroppers., , and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 93-A (11): 2026-2033 (2010)