SPiKE: engineering malware analysis tools using unobtrusive binary-instrumentation
暂无分享,去创建一个
[1] Alec Wolman,et al. Instrumentation and optimization of Win32/intel executables using Etch , 1997 .
[2] Bryan Cantrill,et al. Dynamic Instrumentation of Production Systems , 2004, USENIX Annual Technical Conference, General Track.
[3] Richard J. Moore. A Universal Dynamic Trace for Linux and Other Operating Systems , 2001, USENIX Annual Technical Conference, FREENIX Track.
[4] Nicholas Nethercote,et al. Valgrind: A Program Supervision Framework , 2003, RV@CAV.
[5] Koen De Bosschere,et al. DIOTA: Dynamic Instrumentation, Optimization and Transformation of Applications , 2002, PACT 2002.
[6] Michel Dagenais,et al. Measuring and Characterizing System Behavior Using Kernel-Level Event Logging , 2000, USENIX Annual Technical Conference, General Track.
[7] Galen C. Hunt,et al. Detours: binary interception of Win32 functions , 1999 .
[8] Mary Lou Soffa,et al. Retargetable and reconfigurable software dynamic translation , 2003, International Symposium on Code Generation and Optimization, 2003. CGO 2003..
[9] Amitabh Srivastava,et al. Vulcan Binary transformation in a distributed environment , 2001 .
[10] Zheng Wang,et al. System support for automatic profiling and optimization , 1997, SOSP.
[11] Harish Patil,et al. Pin: building customized program analysis tools with dynamic instrumentation , 2005, PLDI '05.
[12] James R. Larus,et al. EEL: machine-independent executable editing , 1995, PLDI '95.
[13] Amit Vasudevan,et al. Stealth breakpoints , 2005, 21st Annual Computer Security Applications Conference (ACSAC'05).
[14] Intel Corportation,et al. IA-32 Intel Architecture Software Developers Manual , 2004 .
[15] K HollingsworthJeffrey,et al. An API for Runtime Code Patching , 2000 .
[16] Derek Bruening,et al. Efficient, transparent, and comprehensive runtime code manipulation , 2004 .