共 12 条
[1]
Kinder J., Static Analysis of X86 Executables, (2010)
[2]
Reps B.G., Wysinwyx T., What you see is not what you execute, ACM Transactions on Programming Languages and Systems (TOPLAS), 32, 6, pp. 23-24, (2010)
[3]
Schwartz E.J., Avgerinos T., Brumley D., All you ever wanted to know about dynamic taint analysis and forward symbolic execution (But might have been afraid to ask), IEEE Symposium on Security and Privacy, pp. 317-333, (2010)
[4]
Clarke P., Embedded Systems Next for Hack Attacks, (2015)
[5]
Serpanos D., Voyiatzis A.G., Security Challenges in Embedded Systems, ACM Transactions on Embedded Computing Systems (TECS), 12, 66, (2013)
[6]
Hui J.L., Research on Key Techniques for Firm-Code Reverse Analysis, (2007)
[7]
Cifuentes C., The University of Queensland Binary Translator (UQBT) Framework, (2002)
[8]
Ying L.X., Research on Technologies of Control Flow Reconstruction and Control Structure Recovery in Decompilation, (2010)
[9]
Qemu B.F., A Fast and Portable Dynamic Translator. Proceedings of the FREENIX Track: 2005 USENIX Annual Technical Conference, pp. 41-46, (2005)
[10]
Dan L., Research on Control Flow Reconstruction of Multi-Source Decompilation, (2013)