共 26 条
[1]
Aghaei Ehsan, 2023, Security and Privacy in Communication Networks: 18th EAI International Conference, SecureComm 2022, Virtual Event, Proceedings. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering (462), P39, DOI 10.1007/978-3-031-25538-0_3
[2]
[Anonymous], 2015, arXiv
[3]
WYSINWYX: What You See Is Not What You eXecute
[J].
ACM TRANSACTIONS ON PROGRAMMING LANGUAGES AND SYSTEMS,
2010, 32 (06)
[4]
Binary Ninja, About us
[6]
CWE, Common weakness enumeration
[7]
Devlin J, 2019, 2019 CONFERENCE OF THE NORTH AMERICAN CHAPTER OF THE ASSOCIATION FOR COMPUTATIONAL LINGUISTICS: HUMAN LANGUAGE TECHNOLOGIES (NAACL HLT 2019), VOL. 1, P4171
[8]
Asm2Vec: Boosting Static Representation Robustness for Binary Clone Search against Code Obfuscation and Compiler Optimization
[J].
2019 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2019),
2019,
:472-489
[9]
Feng ZY, 2020, FINDINGS OF THE ASSOCIATION FOR COMPUTATIONAL LINGUISTICS, EMNLP 2020, P1536