Huang, J., Chen, J., Wang, M., & Hu, Y. (2025). FirmCCF: Detecting Custom Cryptographic Function Vulnerabilities Through Query-driven Approaches. IEEE internet of things journal, 1. https://doi.org/10.1109/JIOT.2025.3631834
Chicago Style (17th ed.) CitationHuang, Jing, Jiongyi Chen, Min Wang, and Yupeng Hu. "FirmCCF: Detecting Custom Cryptographic Function Vulnerabilities Through Query-driven Approaches." IEEE Internet of Things Journal 2025: 1. https://doi.org/10.1109/JIOT.2025.3631834.
MLA (9th ed.) CitationHuang, Jing, et al. "FirmCCF: Detecting Custom Cryptographic Function Vulnerabilities Through Query-driven Approaches." IEEE Internet of Things Journal, 2025, p. 1, https://doi.org/10.1109/JIOT.2025.3631834.
Warning: These citations may not always be 100% accurate.