Coda: An End-to-End Neural Program Decompiler
暂无分享,去创建一个
Yuandong Tian | Xinyun Chen | Jishen Zhao | Cheng Fu | Huili Chen | Farinaz Koushanfar | Haolan Liu | Xinyun Chen | Yuandong Tian | F. Koushanfar | Jishen Zhao | Huili Chen | Cheng Fu | Haolan Liu
[1] Gerry Kane,et al. MIPS RISC Architecture , 1987 .
[2] Cristina Cifuentes,et al. Reverse compilation techniques , 1994 .
[3] Pattis. Karel the Robot , 2000 .
[4] Wang Ling,et al. Latent Predictor Networks for Code Generation , 2016, ACL.
[5] Dawn Xiaodong Song,et al. Tree-to-tree Neural Networks for Program Translation , 2018, NeurIPS.
[6] Barton P. Miller,et al. Learning to Analyze Binary Computer Code , 2008, AAAI.
[7] Anh Tuan Nguyen,et al. Lexical statistical machine translation for language migration , 2013, ESEC/FSE 2013.
[8] Dawn Xiaodong Song,et al. Towards Synthesizing Complex Programs From Input-Output Examples , 2017, ICLR.
[9] Eran Yahav,et al. Towards Neural Decompilation , 2019, ArXiv.
[10] David Brumley,et al. BYTEWEIGHT: Learning to Recognize Functions in Binary Code , 2014, USENIX Security Symposium.
[11] Christopher D. Manning,et al. Improved Semantic Representations From Tree-Structured Long Short-Term Memory Networks , 2015, ACL.
[12] Dawn Song,et al. Execution-Guided Neural Program Synthesis , 2018, ICLR.
[13] Heikki Hyyrö. Explaining and Extending the Bit-parallel Approximate String Matching Algorithm of Myers , 2001 .
[14] Rahul Gupta,et al. DeepFix: Fixing Common C Language Errors by Deep Learning , 2017, AAAI.
[15] Jonathon T. Giffin,et al. 2011 IEEE Symposium on Security and Privacy Virtuoso: Narrowing the Semantic Gap in Virtual Machine Introspection , 2022 .
[16] David Brumley,et al. BAP: A Binary Analysis Platform , 2011, CAV.
[17] Mirella Lapata,et al. Language to Logical Form with Neural Attention , 2016, ACL.
[18] Anh Tuan Nguyen,et al. Divide-and-Conquer Approach for Multi-phase Statistical Migration for Source Code (T) , 2015, 2015 30th IEEE/ACM International Conference on Automated Software Engineering (ASE).
[19] Leonidas J. Guibas,et al. Learning Program Embeddings to Propagate Feedback on Student Code , 2015, ICML.
[20] Lingyu Wang,et al. BinComp: A stratified approach to compiler provenance Attribution , 2015, Digit. Investig..
[21] Richard Socher,et al. Learned in Translation: Contextualized Word Vectors , 2017, NIPS.
[22] Alexander Aiken,et al. Stochastic superoptimization , 2012, ASPLOS '13.
[23] David Brumley,et al. Native x86 Decompilation Using Semantics-Preserving Structural Analysis and Iterative Control-Flow Structuring , 2013, USENIX Security Symposium.
[24] Eric Schulte,et al. Using recurrent neural networks for decompilation , 2018, 2018 IEEE 25th International Conference on Software Analysis, Evolution and Reengineering (SANER).
[25] Dan Klein,et al. Abstract Syntax Networks for Code Generation and Semantic Parsing , 2017, ACL.
[26] Christopher Krügel,et al. Effective and Efficient Malware Detection at the End Host , 2009, USENIX Security Symposium.
[27] Ke Wang,et al. Dynamic Neural Program Embedding for Program Repair , 2017, ICLR.
[28] David Brumley,et al. TIE: Principled Reverse Engineering of Types in Binary Programs , 2011, NDSS.
[29] Mike Van Emmerik,et al. Using a decompiler for real-world source recovery , 2004, 11th Working Conference on Reverse Engineering.
[30] Xiangyu Zhang,et al. Reverse engineering of data structures from binary , 2011 .
[31] Khaled Yakdan,et al. Helping Johnny to Analyze Malware: A Usability-Optimized Decompiler and Malware Analysis User Study , 2016, 2016 IEEE Symposium on Security and Privacy (SP).
[32] Dawn Xiaodong Song,et al. Recognizing Functions in Binaries with Neural Networks , 2015, USENIX Security Symposium.