Login / Signup
SoK: How Not to Architect Your Next-Generation TEE Malware?
Kubilay Ahmet Küçük
Steve Moyle
Andrew C. Martin
Alexandru Mereacre
Nicholas Allott
Published in:
CoRR (2022)
Keyphrases
</>
patient specific
malware detection
reverse engineering
web intelligence
data sets
open source
control flow
detect malicious
real time
search engine
relational databases
malicious code