Putting Trojans on the Horns of a Dilemma: Redundancy for Information Theft Detection.
Jedidiah R. CrandallJohn BrevikShaozhi YeGary WassermannDaniela Alvim Seabra de OliveiraZhendong SuShyhtsun Felix WuFrederic T. ChongPublished in: Trans. Comput. Sci. (2009)