Reuse-oriented camouflaging trojan: Vulnerability detection and attack construction | IEEE Conference Publication | IEEE Xplore