Rendezvous: A search engine for binary code
暂无分享,去创建一个
[1] Christopher Krügel,et al. Scalable, Behavior-Based Malware Clustering , 2009, NDSS.
[2] Philip S. Yu,et al. GPLAG: detection of software plagiarism by program dependence graph analysis , 2006, KDD '06.
[3] Zhendong Su,et al. DECKARD: Scalable and Accurate Tree-Based Detection of Code Clones , 2007, 29th International Conference on Software Engineering (ICSE'07).
[4] Shinji Kusumoto,et al. CCFinder: A Multilinguistic Token-Based Code Clone Detection System for Large Scale Source Code , 2002, IEEE Trans. Software Eng..
[5] Dongmei Zhang,et al. XIAO: tuning code clones at hands of engineers in practice , 2012, ACSAC '12.
[6] Jeffrey K. Hollingsworth,et al. An API for Runtime Code Patching , 2000, Int. J. High Perform. Comput. Appl..
[7] M. Mock. Dynamic Analysis from the Bottom Up , 2003 .
[8] Daniel Bilar,et al. Opcodes as predictor for malware , 2007, Int. J. Electron. Secur. Digit. Forensics.
[9] Karl Trygve Kalleberg,et al. Finding software license violations through binary code clone detection , 2011, MSR '11.
[10] Yuanyuan Zhou,et al. CP-Miner: A Tool for Finding Copy-paste and Related Bugs in Operating System Code , 2004, OSDI.
[11] Burton H. Bloom,et al. Space/time trade-offs in hash coding with allowable errors , 1970, CACM.
[12] A. Mockus,et al. Large-Scale Code Reuse in Open Source Software , 2007, First International Workshop on Emerging Trends in FLOSS Research and Development (FLOSS'07: ICSE Workshops 2007).
[13] Thomas Dullien,et al. Graph-based comparison of Executable Objects , 2005 .
[14] Christopher Krügel,et al. Polymorphic Worm Detection Using Structural Information of Executables , 2005, RAID.
[15] George S. Avrunin,et al. Combining symbolic execution with model checking to verify parallel numerical programs , 2008, TSEM.
[16] Flaviu Ghitulescu,et al. Google Code Search , 2006 .
[17] Daniel J. Quinlan,et al. Detecting code clones in binary executables , 2009, ISSTA.
[18] Ke Wang,et al. Fileprints: identifying file types by n-gram analysis , 2005, Proceedings from the Sixth Annual IEEE SMC Information Assurance Workshop.
[19] Christopher Krügel,et al. Limits of Static Analysis for Malware Detection , 2007, Twenty-Third Annual Computer Security Applications Conference (ACSAC 2007).
[20] Gregory R. Andrews,et al. Disassembly of executable code revisited , 2002, Ninth Working Conference on Reverse Engineering, 2002. Proceedings..
[21] Andrew Walenstein,et al. Malware phylogeny generation using permutations of code , 2005, Journal in Computer Virology.
[22] Katsuro Inoue,et al. MUDABlue: an automatic categorization system for open source repositories , 2004, 11th Asia-Pacific Software Engineering Conference.
[23] Christopher. Gautier,et al. Software plagiarism detection with PEGs , 2011 .
[24] Christian S. Collberg,et al. K-gram based software birthmarks , 2005, SAC '05.
[25] Collin McMillan,et al. Detecting similar software applications , 2012, 2012 34th International Conference on Software Engineering (ICSE).
[26] Brendan D. McKay,et al. Practical graph isomorphism, II , 2013, J. Symb. Comput..