Jakstab: A Static Analysis Platform for Binaries
暂无分享,去创建一个
[1] Thomas W. Reps,et al. Analyzing Memory Accesses in x86 Executables , 2004, CC.
[2] Saumya K. Debray,et al. Obfuscation of executable code to improve resistance to static disassembly , 2003, CCS '03.
[3] Thomas W. Reps,et al. WYSINWYX: What You See Is Not What You eXecute , 2005, VSTTE.
[4] George C. Necula,et al. Analysis of Low-Level Code Using Cooperating Decompilers , 2006, SAS.
[5] Cristina Cifuentes,et al. Reverse compilation techniques , 1994 .
[6] Shane Sendall,et al. Specifying the semantics of machine instructions , 1998, Proceedings. 6th International Workshop on Program Comprehension. IWPC'98 (Cat. No.98TB100242).
[7] Thomas W. Reps,et al. Analyzing Stripped Device-Driver Executables , 2008, TACAS.
[8] Thomas W. Reps,et al. WYSINWYX: What you see is not what you eXecute , 2005, TOPL.
[9] Stefan Katzenbeisser,et al. Detecting Malicious Code by Model Checking , 2005, DIMVA.
[10] Mike Van Emmerik,et al. Using a decompiler for real-world source recovery , 2004, 11th Working Conference on Reverse Engineering.
[11] Thomas A. Henzinger,et al. SYNERGY: a new algorithm for property checking , 2006, SIGSOFT '06/FSE-14.