Login / Signup
SoK: How Not to Architect Your Next-Generation TEE Malware?
Kubilay Ahmet Küçük
Steve Moyle
Andrew C. Martin
Alexandru Mereacre
Nicholas Allott
Published in:
HASP@MICRO (2022)
Keyphrases
</>
patient specific
control flow
malware detection
malicious code
reverse engineering
detect malicious
databases
data mining
website
open source
static analysis