Login / Signup

SoK: How Not to Architect Your Next-Generation TEE Malware?

Kubilay Ahmet KüçükSteve MoyleAndrew C. MartinAlexandru MereacreNicholas Allott
Published in: HASP@MICRO (2022)
Keyphrases
  • patient specific
  • control flow
  • malware detection
  • malicious code
  • reverse engineering
  • detect malicious
  • databases
  • data mining
  • website
  • open source
  • static analysis