Supervised learning for provenance-similarity of binaries
暂无分享,去创建一个
[1] Debin Gao,et al. BinHunt: Automatically Finding Semantic Differences in Binary Programs , 2008, ICICS.
[2] Thomas Dullien,et al. Graph-based comparison of Executable Objects , 2005 .
[3] Andrew Walenstein,et al. Exploiting Similarity Between Variants to Defeat Malware “ Vilo ” Method for Comparing and Searching Binary Programs , 2007 .
[4] Yong Chen,et al. Automatic malware categorization using cluster ensemble , 2010, KDD.
[5] Barton P. Miller,et al. Extracting compiler provenance from program binaries , 2010, PASTE '10.
[6] Stephen McCamant,et al. Binary Code Extraction and Interface Identification for Security Applications , 2009, NDSS.
[7] Andrew Walenstein,et al. The Software Similarity Problem in Malware Analysis , 2006, Duplication, Redundancy, and Similarity in Software.
[8] Daniel J. Quinlan,et al. Detecting code clones in binary executables , 2009, ISSTA.
[9] Hyun-il Lim,et al. A Static Birthmark of Binary Executables Based on API Call Structure , 2007, ASIAN.
[10] Andrew Walenstein,et al. Evaluation of malware phylogeny modelling systems using automated variant generation , 2009, Journal in Computer Virology.
[11] Leo Breiman,et al. Random Forests , 2001, Machine Learning.
[12] Halvar Flake,et al. Structural Comparison of Executable Objects , 2004, DIMVA.
[13] Kang G. Shin,et al. Large-scale malware indexing using function-call graphs , 2009, CCS.
[14] Stacy J. Prowell,et al. Computing the behavior of malicious code with function extraction technology , 2009, CSIIRW '09.
[15] Michael Meier,et al. Measuring similarity of malware behavior , 2009, 2009 IEEE 34th Conference on Local Computer Networks.