Labeling library functions in stripped binaries
暂无分享,去创建一个
[1] Tibor Gyimóthy,et al. Interprocedural static slicing of binary executables , 2003, Proceedings Third IEEE International Workshop on Source Code Analysis and Manipulation.
[2] Christopher Krügel,et al. Effective and Efficient Malware Detection at the End Host , 2009, USENIX Security Symposium.
[3] Halvar Flake,et al. Structural Comparison of Executable Objects , 2004, DIMVA.
[4] Mike Emmerik. Signatures for Library Functions in Executable Files , 1994 .
[5] Christopher Krügel,et al. Polymorphic Worm Detection Using Structural Information of Executables , 2005, RAID.
[6] Thomas E. Cheatham,et al. Symbolic Evaluation and the Analysis of Programs , 1979, IEEE Transactions on Software Engineering.
[7] Cristina Cifuentes,et al. Intraprocedural static slicing of binary executables , 1997, 1997 Proceedings International Conference on Software Maintenance.
[8] Christopher Krügel,et al. Scalable, Behavior-Based Malware Clustering , 2009, NDSS.
[9] Barton P. Miller,et al. Extracting compiler provenance from program binaries , 2010, PASTE '10.
[10] P. David Coward. Symbolic execution systems-a review , 1988, Softw. Eng. J..
[11] Cristina Cifuentes,et al. Decompilation of binary programs , 1995, Softw. Pract. Exp..
[12] Henrik Theiling,et al. Extracting safe and precise control flow from binaries , 2000, Proceedings Seventh International Conference on Real-Time Computing Systems and Applications.
[13] Thomas W. Reps,et al. WYSINWYX: What You See Is Not What You eXecute , 2005, VSTTE.
[14] Barton P. Miller,et al. Learning to Analyze Binary Computer Code , 2008, AAAI.
[15] Somesh Jha,et al. Synthesizing Near-Optimal Malware Specifications from Suspicious Behaviors , 2010, 2010 IEEE Symposium on Security and Privacy.
[16] Thomas Dullien,et al. Graph-based comparison of Executable Objects , 2005 .