Towards Extracting Control Flow Abstraction with Static Disassembly for Binary Code
暂无分享,去创建一个
[1] Xiangyu Zhang,et al. Automatic Reverse Engineering of Data Structures from Binary Execution , 2010, NDSS.
[2] R. Sekar,et al. On the Limits of Information Flow Techniques for Malware Analysis and Containment , 2008, DIMVA.
[3] David Brumley,et al. TIE: Principled Reverse Engineering of Types in Binary Programs , 2011, NDSS.
[4] Tzi-cker Chiueh,et al. BIRD: binary interpretation using runtime disassembly , 2006, International Symposium on Code Generation and Optimization (CGO'06).
[5] Gregory R. Andrews,et al. Disassembly of executable code revisited , 2002, Ninth Working Conference on Reverse Engineering, 2002. Proceedings..
[6] Henrik Theiling,et al. Extracting safe and precise control flow from binaries , 2000, Proceedings Seventh International Conference on Real-Time Computing Systems and Applications.
[7] Thomas W. Reps,et al. Analyzing Stripped Device-Driver Executables , 2008, TACAS.
[8] Saumya K. Debray,et al. Static Detection of Disassembly Errors , 2009, 2009 16th Working Conference on Reverse Engineering.
[9] Saumya K. Debray,et al. Obfuscation of executable code to improve resistance to static disassembly , 2003, CCS '03.
[10] Christian S. Collberg,et al. Watermarking, Tamper-Proofing, and Obfuscation-Tools for Software Protection , 2002, IEEE Trans. Software Eng..
[11] Somesh Jha,et al. Static Analysis of Executables to Detect Malicious Patterns , 2003, USENIX Security Symposium.
[12] Gregory R. Andrews,et al. Binary Obfuscation Using Signals , 2007, USENIX Security Symposium.
[13] Gregory Wroblewski,et al. General Method of Program Code Obfuscation , 2002 .
[14] Cristina Cifuentes,et al. Recovery of jump table case statements from binary code , 1999, Proceedings Seventh International Workshop on Program Comprehension.