Automated vulnerability analysis technique for smart grid infrastructure
暂无分享,去创建一个
Jongin Lim | Huy Kang Kim | Koudjo M. Koumadi | YooJin Kwon | Yong Hun Lim | H. Kim | Jong-in Lim | K. Koumadi | Yong-hun Lim | YooJin Kwon
[1] Rajeev Barua,et al. A compiler-level intermediate representation based binary analysis and rewriting system , 2013, EuroSys '13.
[2] Christopher Krügel,et al. A survey on automated dynamic malware-analysis techniques and tools , 2012, CSUR.
[3] Niranjan Hasabnis,et al. Lifting Assembly to Intermediate Representation: A Novel Approach Leveraging Compilers , 2016 .
[4] Zhenkai Liang,et al. BitBlaze: A New Approach to Computer Security via Binary Analysis , 2008, ICISS.
[5] Saumya Debray,et al. A Generic Approach to Automatic Deobfuscation of Executable Code , 2015, 2015 IEEE Symposium on Security and Privacy.
[6] Christian Rossow,et al. Cross-Architecture Bug Search in Binary Executables , 2015, 2015 IEEE Symposium on Security and Privacy.
[7] Osama A. Mohammed,et al. A Survey on Smart Grid Cyber-Physical System Testbeds , 2017, IEEE Communications Surveys & Tutorials.
[8] Bin Zhang,et al. Detecting integer overflow in Windows binary executables based on symbolic execution , 2016, 2016 17th IEEE/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD).
[9] Jason Hiser,et al. A System for the Security Protection of Embedded Binary Programs , 2016, 2016 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshop (DSN-W).