1 code implementation • International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment 2021 • Omid Mirzaei, Roman Vasilenko, Engin Kirda, Long Lu, Amin Kharraz
In response to such attacks, both academia and industry have investigated techniques to model and reconstruct these attacks and to defend against them.
1 code implementation • Future Generation Computer Systems 2019 • Omid Mirzaei, Jose Maria de Fuentes, Juan Tapiador, Lorena Gonzáles-Manzano
This is typically applied to protect intellectual property in benign apps, or to hinder the process of extracting actionable information in the case malware.