BCD: Decomposing Binary Code Into Components Using Graph-Based Clustering
暂无分享,去创建一个
Latifur Khan | Kevin W. Hamlen | Zhiqiang Lin | Juan Caballero | Swarup Chandra | Vishal Karande | Zhiqiang Lin | Juan Caballero | L. Khan | Swarup Chandra | Vishal M. Karande
[1] David Brumley,et al. BYTEWEIGHT: Learning to Recognize Functions in Binary Code , 2014, USENIX Security Symposium.
[2] Mike Van Emmerik,et al. Using a decompiler for real-world source recovery , 2004, 11th Working Conference on Reverse Engineering.
[3] Daniel J. Quinlan,et al. Detecting code clones in binary executables , 2009, ISSTA.
[4] Xiangyu Zhang,et al. Reuse-oriented reverse engineering of functional components from x86 binaries , 2014, ICSE.
[5] Barton P. Miller,et al. Labeling library functions in stripped binaries , 2011, PASTE '11.
[6] Emden R. Gansner,et al. Bunch: a clustering tool for the recovery and maintenance of software system structures , 1999, Proceedings IEEE International Conference on Software Maintenance - 1999 (ICSM'99). 'Software Maintenance for Business Change' (Cat. No.99CB36360).
[7] Atul Prakash,et al. Expose: Discovering Potential Binary Code Re-use , 2013, 2013 IEEE 37th Annual Computer Software and Applications Conference.
[8] Ross J. Anderson,et al. Rendezvous: A search engine for binary code , 2013, 2013 10th Working Conference on Mining Software Repositories (MSR).
[9] Levent Özgür,et al. Text Categorization with Class-Based and Corpus-Based Keyword Selection , 2005, ISCIS.
[10] Nicolas Anquetil,et al. Experiments with clustering as a software remodularization method , 1999, Sixth Working Conference on Reverse Engineering (Cat. No.PR00303).
[11] Stephen McCamant,et al. Binary Code Extraction and Interface Identification for Security Applications , 2009, NDSS.
[12] M E J Newman,et al. Fast algorithm for detecting community structure in networks. , 2003, Physical review. E, Statistical, nonlinear, and soft matter physics.
[13] Christopher Krügel,et al. Inspector Gadget: Automated Extraction of Proprietary Gadgets from Malware Binaries , 2010, 2010 IEEE Symposium on Security and Privacy.
[14] Fangfang Zhang,et al. A first step towards algorithm plagiarism detection , 2012, ISSTA 2012.
[15] Zhendong Su,et al. Automatic mining of functionally equivalent code fragments via random testing , 2009, ISSTA.
[16] Sencun Zhu,et al. Behavior based software theft detection , 2009, CCS.
[17] Christopher Krügel,et al. A survey on automated dynamic malware-analysis techniques and tools , 2012, CSUR.
[18] Stephen McCamant,et al. Input generation via decomposition and re-stitching: finding bugs in Malware , 2010, CCS '10.
[19] Kevin W. Hamlen,et al. Object Flow Integrity , 2017, CCS.
[20] Richard Cole,et al. Dictionary matching and indexing with errors and don't cares , 2004, STOC '04.
[21] Debin Gao,et al. BinHunt: Automatically Finding Semantic Differences in Binary Programs , 2008, ICICS.
[22] Barton P. Miller,et al. Who Wrote This Code? Identifying the Authors of Program Binaries , 2011, ESORICS.
[23] David Brumley,et al. Blanket Execution: Dynamic Similarity Testing for Program Binaries and Components , 2014, USENIX Security Symposium.
[24] Xiaozhu Meng,et al. Fine-grained binary code authorship identification , 2016, SIGSOFT FSE.
[25] Chris Eagle,et al. The IDA Pro Book: The Unofficial Guide to the World's Most Popular Disassembler , 2008 .
[26] Lingyu Wang,et al. OBA2: An Onion approach to Binary code Authorship Attribution , 2014, Digit. Investig..
[27] Thomas W. Reps,et al. Recovery of Class Hierarchies and Composition Relationships from Machine Code , 2014, CC.
[28] Susan Horwitz,et al. Detecting and Measuring Similarity in Code Clones , 2009 .
[29] David Brumley,et al. Native x86 Decompilation Using Semantics-Preserving Structural Analysis and Iterative Control-Flow Structuring , 2013, USENIX Security Symposium.