BScout: Direct Whole Patch Presence Test for Java Executables
暂无分享,去创建一个
Yuan Zhang | Zhemin Yang | Xiaohan Zhang | Xinyu Xing | Junyan Chen | Xin Tan | Min Yang | Jiarun Dai | Zheyue Jiang | Yingtian Zhou | Xinyu Xing | Yuan Zhang | Xin Tan | Zhemin Yang | Min Yang | Junyan Chen | Xiaohan Zhang | Jiarun Dai | Zheyue Jiang | Ying Zhou
[1] Debin Gao,et al. BinHunt: Automatically Finding Semantic Differences in Binary Programs , 2008, ICICS.
[2] Frank Yellin,et al. The Java Virtual Machine Specification , 1996 .
[3] Hang Zhang,et al. Precise and Accurate Patch Presence Test for Binaries , 2018, USENIX Security Symposium.
[4] Shouhuai Xu,et al. VulDeePecker: A Deep Learning-Based System for Vulnerability Detection , 2018, NDSS.
[5] Cristina V. Lopes,et al. SourcererCC: Scaling Code Clone Detection to Big-Code , 2015, 2016 IEEE/ACM 38th International Conference on Software Engineering (ICSE).
[6] Ross J. Anderson,et al. Rendezvous: A search engine for binary code , 2013, 2013 10th Working Conference on Mining Software Repositories (MSR).
[7] Vern Paxson,et al. A Large-Scale Empirical Study of Security Patches , 2017, CCS.
[8] Thomas Dullien,et al. Graph-based comparison of Executable Objects , 2005 .
[9] David Brumley,et al. ReDeBug: Finding Unpatched Code Clones in Entire OS Distributions , 2012, 2012 IEEE Symposium on Security and Privacy.
[10] Renaud Pawlak,et al. SPOON: A library for implementing analyses and transformations of Java source code , 2016, Softw. Pract. Exp..
[11] Le Song,et al. Neural Network-based Graph Embedding for Cross-Platform Binary Code Similarity Detection , 2018 .
[12] Khaled Yakdan,et al. discovRE: Efficient Cross-Architecture Identification of Bugs in Binary Code , 2016, NDSS.
[13] Peng Liu,et al. Achieving accuracy and scalability simultaneously in detecting application clones on Android markets , 2014, ICSE.
[14] Wenke Lee,et al. Identifying Open-Source License Violation and 1-day Security Risk at Large Scale , 2017, CCS.
[15] Daniel T. Larose,et al. Discovering Knowledge in Data: An Introduction to Data Mining , 2005 .
[16] Zhendong Su,et al. DECKARD: Scalable and Accurate Tree-Based Detection of Code Clones , 2007, 29th International Conference on Software Engineering (ICSE'07).
[17] Erik Derr,et al. Reliable Third-Party Library Detection in Android and its Security Applications , 2016, CCS.
[18] Yuanyuan Zhou,et al. CP-Miner: finding copy-paste and related bugs in large-scale software code , 2006, IEEE Transactions on Software Engineering.
[19] Heejo Lee,et al. VUDDY: A Scalable Approach for Vulnerable Code Clone Discovery , 2017, 2017 IEEE Symposium on Security and Privacy (SP).
[20] Shinji Kusumoto,et al. CCFinder: A Multilinguistic Token-Based Code Clone Detection System for Large Scale Source Code , 2002, IEEE Trans. Software Eng..
[21] Heng Yin,et al. Scalable Graph-based Bug Search for Firmware Images , 2016, CCS.
[22] Christian Rossow,et al. Cross-Architecture Bug Search in Binary Executables , 2015, 2015 IEEE Symposium on Security and Privacy.
[23] Peng Wang,et al. Finding Unknown Malice in 10 Seconds: Mass Vetting for New Threats at the Google-Play Scale , 2015, USENIX Security Symposium.
[24] Andrew McCallum,et al. Conditional Random Fields: Probabilistic Models for Segmenting and Labeling Sequence Data , 2001, ICML.
[25] Andy King,et al. BinSlayer: accurate comparison of binary executables , 2013, PPREW '13.
[26] Yunsong Guo,et al. Comparisons of sequence labeling algorithms and extensions , 2007, ICML '07.
[27] Shouhuai Xu,et al. VulPecker: an automated vulnerability detection system based on code similarity analysis , 2016, ACSAC.