Identifying Reused Functions in Binary Code
暂无分享,去创建一个
Amr M. Youssef | Saed Alrabaee | Paria Shirani | Mourad Debbabi | Aiman Hanna | Djedjiga Mouheb | Lingyu Wang | Ashkan Rahimian | Lina Nouh | He Huang
[1] Lingyu Wang,et al. OBA2: An Onion approach to Binary code Authorship Attribution , 2014, Digit. Investig..
[2] Martin Fowler,et al. Refactoring - Improving the Design of Existing Code , 1999, Addison Wesley object technology series.
[3] Konrad Rieck,et al. Modeling and Discovering Vulnerabilities with Code Property Graphs , 2014, 2014 IEEE Symposium on Security and Privacy.
[4] Mark Stamp,et al. Hunting for undetectable metamorphic viruses , 2011, Journal in Computer Virology.
[5] Bazara I. A. Barry,et al. Enhancing the Detection of Metamorphic Malware using Call Graphs , 2015 .
[6] Kaspar Riesen,et al. Exact and Inexact Graph Matching: Methodology and Applications , 2010, Managing and Mining Graph Data.
[7] Kang G. Shin,et al. Large-scale malware indexing using function-call graphs , 2009, CCS.