2Kai Chen, Peng Wang, Yeonjoon Lee, Xiaof'eng Wang, Nan Zhang, Heqing Huang. Wei Zou, and Peng Liu. Finding unknown mslice in 10 seconds: Ala.ss elling lor new threats 8/ the google-play scale. In the Proceedings of the 24th USENIX Security Symposium, August 2015.
3Frank fmeson, et al. Securing Computer Hardware Using 3D Integrated Circuit (IC) Technology and Split ManulBclunng for Obfuscation. In the Proceedings of the 22nd USENIX Security. August 20.13.
5Roger Dingledine, Nick Mathewson, and Paul Syverson. Tor: the Second-Gene.ration Onion Router, In the Proceedings of the 13th USENLX Security Symposium, August 2004.
6Crispin Cowan, et aI. StaclcCuarri: Automatic Adaptive Detection and Prevention of Buffer-Overflow Auscks. In the Proceedings of the 7th USENLX Security Symposium, January 1998.