Last update: Sun Apr 28 02:05:21 MDT 2019
@Article{Lakhotia:2005:MDO, author = "Arun Lakhotia and Eric Uday Kumar and M. Venable", title = "A method for detecting obfuscated calls in malicious binaries", journal = j-IEEE-TRANS-SOFTW-ENG, volume = "31", number = "11", pages = "955--968", month = nov, year = "2005", CODEN = "IESEDJ", DOI = "https://doi.org/10.1109/TSE.2005.120", ISSN = "0098-5589 (print), 1939-3520 (electronic)", ISSN-L = "0098-5589", bibdate = "Thu Feb 1 11:00:42 MST 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/ieeetranssoftweng2000.bib", URL = "http://ieeexplore.ieee.org/stamp/stamp.jsp?arnumber=1556554", acknowledgement = ack-nhfb, fjournal = "IEEE Transactions on Software Engineering", journal-URL = "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=32", }