Jump to content
Tuts 4 You

A Couple of Nice Papers


Recommended Posts

Cryptographic Function Detection in Obfuscated Binaries via Bit-precise Symbolic Loop Mapping : Get it HERE .

Targeting Infeasibility Questions on Obfuscated Codes : Get it HERE .


  • Like 3
Link to comment
Share on other sites

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now
  • Create New...