Speculative disassembly of binary code
暂无分享,去创建一个
Dominik Stoffel | Wolfgang Kunz | M. Ammar Ben Khadra | W. Kunz | D. Stoffel | M. Ammar | Benguettache Khadra
[1] Thomas W. Reps,et al. Directed Proof Generation for Machine Code , 2010, CAV.
[2] Hovav Shacham,et al. Comprehensive Experimental Analyses of Automotive Attack Surfaces , 2011, USENIX Security Symposium.
[3] Henrik Theiling,et al. Extracting safe and precise control flow from binaries , 2000, Proceedings Seventh International Conference on Real-Time Computing Systems and Applications.
[4] Thomas W. Reps,et al. WYSINWYX: What You See Is Not What You eXecute , 2005, VSTTE.
[5] Barton P. Miller,et al. Learning to Analyze Binary Computer Code , 2008, AAAI.
[6] Barton P. Miller,et al. Practical analysis of stripped binary code , 2005, CARN.
[7] Murat Kantarcioglu,et al. Shingled Graph Disassembly: Finding the Undecideable Path , 2014, PAKDD.
[8] Helmut Veith,et al. An Abstract Interpretation-Based Framework for Control Flow Reconstruction from Binaries , 2008, VMCAI.
[9] Alan J. Hu,et al. Embedded Software Verification Using Symbolic Execution and Uninterpreted Functions , 2006, International Journal of Parallel Programming.
[10] Christopher Krügel,et al. Limits of Static Analysis for Malware Detection , 2007, Twenty-Third Annual Computer Security Applications Conference (ACSAC 2007).
[11] Xuejun Yang,et al. Finding and understanding bugs in C compilers , 2011, PLDI '11.
[12] R. Nigel Horspool,et al. An Approach to the Problem of Detranslation of Computer Programs , 1980, Comput. J..
[13] Zhendong Su,et al. Compiler validation via equivalence modulo inputs , 2014, PLDI.
[14] David Brumley,et al. BYTEWEIGHT: Learning to Recognize Functions in Binary Code , 2014, USENIX Security Symposium.
[15] Christopher Krügel,et al. Static Disassembly of Obfuscated Binaries , 2004, USENIX Security Symposium.
[16] Mingwei Zhang,et al. Control Flow Integrity for COTS Binaries , 2013, USENIX Security Symposium.
[17] Saumya K. Debray,et al. Obfuscation of executable code to improve resistance to static disassembly , 2003, CCS '03.
[18] Dominik Stoffel,et al. An equivalence checker for hardware-dependent embedded system software , 2013, 2013 Eleventh ACM/IEEE International Conference on Formal Methods and Models for Codesign (MEMOCODE 2013).
[19] Rajeev Barua,et al. A compiler-level intermediate representation based binary analysis and rewriting system , 2013, EuroSys '13.
[20] Cristina Cifuentes,et al. Recovery of jump table case statements from binary code , 1999, Proceedings Seventh International Workshop on Program Comprehension.
[21] Bastian Schlich,et al. Model checking of software for microcontrollers , 2010, TECS.
[22] Giovanni Vigna,et al. Static Detection of Vulnerabilities in x86 Executables , 2006, 2006 22nd Annual Computer Security Applications Conference (ACSAC'06).