[1] |
PEWNY J, SCHUSTER F, BERNHARD L, et al.Leveraging Semantic Signatures for Bug Search in Binary Programs[C]//ACSAC. Annual Computer Security Applications Conference, December 8 - 12, 2014 ,New Orleans, Louisiana, USA . New York:ACM. 2014:406-415.
|
[2] |
BOURQUIN M, KING A, ROBBINS E.Binslayer: Accurate Comparison of Binary Executables[C]//PPREW. ACM SIGPLAN Program Protection and Reverse Engineering Workshop, January 26, 2013. Rome, Italy. ITA:PPREW, 2013:1-10.
|
[3] |
PEWNY J, GARMANY B, GAWLIK R, et al.Cross-Architecture Bug Search in Binary Executables[C]//IEEE. 36th IEEE Symposium on Security and Privacy (S&P), May 18-20, 2015. Fairmont, San Jose,CA. NJ:IEEE, 2015:709-724.
|
[4] |
刘春红,郭涛,崔宝江,等. 二进制文件同源性检测的结构化相似度计算[J]. 北京邮电大学学报,2012,35(3):56-60.
|
[5] |
王毅,唐勇,卢泽新,等. 恶意代码聚类中的特征选取[J]. 信息网络安全,2016(9):64-68.
|
[6] |
DAVID Y, PARTUSH N, YAHAV E.Statistical Similarity of Binaries[J]. ACM Sigplan Conference on Programming Language Design & Implementation, 2016,51(6):266-280.
|
[7] |
林佳萍,李晖,等. 安卓恶意软件检测研究综述[J]. 信息网络安全,2016(10):80-88.
|
[8] |
LUO Lannan, MING Jiang, WU Dinghao, et al.Semantics-based Obfuscation-resilient Binary Code Similarity Comparison with Applications to Software Plagiarism Detection[C]//FSE. ACM SIGSOFT International Symposium on Foundations of Software Engineering, November 16 - 21, 2014 . Hong Kong, China. CHN:FSE, 2014:389-400.
|
[9] |
彭建山,奚琪,王清贤,等. 二进制程序整型溢出漏洞的自动验证方法[J]. 信息网络安全,2017(5):14-21.
|
[10] |
IDA. Pro - Interactive Disassembler[EB/OL]. , 2016-3-11.
|