Detecting code clones in binary executables
暂无分享,去创建一个
Daniel J. Quinlan | Andreas Sæbjørnsen | Zhendong Su | Jeremiah Willcock | Thomas Panas | Andreas Sæbjørnsen | Jeremiah Willcock | T. Panas | D. Quinlan | Z. Su
[1] Brenda S. Baker,et al. Parameterized Duplication in Strings: Algorithms and an Application to Software Maintenance , 1997, SIAM J. Comput..
[2] Piotr Indyk,et al. Approximate nearest neighbors: towards removing the curse of dimensionality , 1998, STOC '98.
[3] Piotr Indyk,et al. Similarity Search in High Dimensions via Hashing , 1999, VLDB.
[4] Susan Horwitz,et al. Using Slicing to Identify Duplication in Source Code , 2001, SAS.
[5] Christopher W. Pidgeon,et al. DMS®: Program Transformations for Practical Scalable Software Evolution , 2002, IWPSE '02.
[6] Shinji Kusumoto,et al. CCFinder: A Multilinguistic Token-Based Code Clone Detection System for Large Scale Source Code , 2002, IEEE Trans. Software Eng..
[7] Somesh Jha,et al. Static Analysis of Executables to Detect Malicious Patterns , 2003, USENIX Security Symposium.
[8] Markus Schordan,et al. A Source-to-Source Architecture for User-Defined Optimizations , 2003, JMLC.
[9] Daniel Shawcross Wilkerson,et al. Winnowing: local algorithms for document fingerprinting , 2003, SIGMOD '03.
[10] Yuanyuan Zhou,et al. CP-Miner: A Tool for Finding Copy-paste and Related Bugs in Operating System Code , 2004, OSDI.
[11] I.D. Baxter,et al. DMS/spl reg/: program transformations for practical scalable software evolution , 2004, Proceedings. 26th International Conference on Software Engineering.
[12] Somesh Jha,et al. Testing malware detectors , 2004, ISSTA '04.
[13] Jürgen Wolff von Gudenberg,et al. Clone detection in source code by frequent itemset techniques , 2004, Source Code Analysis and Manipulation, Fourth IEEE International Workshop on.
[14] Dietmar Seipel,et al. Clone detection in source code by frequent itemset techniques , 2004 .
[15] Trevor Darrell,et al. Nearest-Neighbor Methods in Learning and Vision: Theory and Practice (Neural Information Processing) , 2006 .
[16] Somesh Jha,et al. Semantics-aware malware detection , 2005, 2005 IEEE Symposium on Security and Privacy (S&P'05).
[17] Christopher Krügel,et al. Polymorphic Worm Detection Using Structural Information of Executables , 2005, RAID.
[18] Stan Jarzabek,et al. Detecting higher-level similarity patterns in programs , 2005, ESEC/FSE-13.
[19] Mattia Monga,et al. Detecting Self-mutating Malware Using Control-Flow Graph Matching , 2006, DIMVA.
[20] Alexandr Andoni,et al. Near-Optimal Hashing Algorithms for Approximate Nearest Neighbor in High Dimensions , 2006, 2006 47th Annual IEEE Symposium on Foundations of Computer Science (FOCS'06).
[21] Alexandr Andoni,et al. Near-Optimal Hashing Algorithms for Approximate Nearest Neighbor in High Dimensions , 2006, 2006 47th Annual IEEE Symposium on Foundations of Computer Science (FOCS'06).
[22] Zhendong Su,et al. DECKARD: Scalable and Accurate Tree-Based Detection of Code Clones , 2007, 29th International Conference on Software Engineering (ICSE'07).
[23] Heng Yin,et al. Panorama: capturing system-wide information flow for malware detection and analysis , 2007, CCS '07.
[24] David Schuler,et al. A dynamic birthmark for java , 2007, ASE.
[25] Zhendong Su,et al. Scalable detection of semantic clones , 2008, 2008 ACM/IEEE 30th International Conference on Software Engineering.