Gorille sniffs code similarities, the case study of qwerty versus regin
暂无分享,去创建一个
[1] Arun Lakhotia,et al. FuncTracker: Discovering Shared Code to Aid Malware Forensics , 2013, LEET.
[2] Lingyu Wang,et al. SIGMA: A Semantic Integrated Graph Matching Approach for identifying reused functions in binary code , 2015, Digit. Investig..
[3] Roberto Giacobazzi,et al. Unveiling metamorphism by abstract interpretation of code properties , 2015, Theor. Comput. Sci..
[4] Guillaume Bonfante,et al. Architecture of a morphological malware detector , 2009, Journal in Computer Virology.
[5] Guillaume Bonfante,et al. Analysis and diversion of Duqu's driver , 2013, 2013 8th International Conference on Malicious and Unwanted Software: "The Americas" (MALWARE).