A Look Back on a Function Identification Problem
暂无分享,去创建一个
[1] Herbert Bos,et al. Compiler-Agnostic Function Detection in Binaries , 2017, 2017 IEEE European Symposium on Security and Privacy (EuroS&P).
[2] Tosiron Adegbija,et al. A Workload Characterization of the SPEC CPU2017 Benchmark Suite , 2018, 2018 IEEE International Symposium on Performance Analysis of Systems and Software (ISPASS).
[3] R. Tibshirani,et al. Sparsity and smoothness via the fused lasso , 2005 .
[4] David Brumley,et al. BYTEWEIGHT: Learning to Recognize Functions in Binary Code , 2014, USENIX Security Symposium.
[5] Dinghao Wu,et al. Semantics-Aware Machine Learning for Function Recognition in Binary Code , 2017, 2017 IEEE International Conference on Software Maintenance and Evolution (ICSME).
[6] Matthew Crosby,et al. Association for the Advancement of Artificial Intelligence , 2014 .
[7] Dawn Xiaodong Song,et al. Recognizing Functions in Binaries with Neural Networks , 2015, USENIX Security Symposium.
[8] R. Sekar,et al. Function Interface Analysis: A Principled Approach for Function Recognition in COTS Binaries , 2017, 2017 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN).
[9] Barton P. Miller,et al. Learning to Analyze Binary Computer Code , 2008, AAAI.
[10] Jiahua Chen,et al. Variable Selection in Finite Mixture of Regression Models , 2007 .
[11] Giovanni Agosta,et al. rev.ng: a unified binary analysis framework to recover CFGs and function boundaries , 2017, CC.
[12] Gang Wang,et al. LEMNA: Explaining Deep Learning based Security Applications , 2018, CCS.
[13] Barton P. Miller,et al. Labeling library functions in stripped binaries , 2011, PASTE '11.
[14] Christopher Krügel,et al. SOK: (State of) The Art of War: Offensive Techniques in Binary Analysis , 2016, 2016 IEEE Symposium on Security and Privacy (SP).
[15] Jim Alves-Foss,et al. Function boundary detection in stripped binaries , 2019, ACSAC.
[16] David Brumley,et al. BAP: A Binary Analysis Platform , 2011, CAV.
[17] Xi Chen,et al. An In-Depth Analysis of Disassembly on Full-Scale x86/x64 Binaries , 2016, USENIX Security Symposium.