共 74 条
- [1] Alrabaee S, 2020, Library Function Identification, P79, DOI [10.1007/978-3-030-34238-84, DOI 10.1007/978-3-030-34238-84]
- [2] [Anonymous], 2017, francisck: DanderSpritz docs
- [3] Arpit D, 2017, PR MACH LEARN RES, V70
- [4] Bubeck S., 2023, SPARKS ARTIFICIAL GE
- [5] Carbone M, 2009, CCS'09: PROCEEDINGS OF THE 16TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P555
- [6] DIComP: Lightweight Data-Driven Inference of Binary Compiler Provenance with High Accuracy [J]. 2022 IEEE INTERNATIONAL CONFERENCE ON SOFTWARE ANALYSIS, EVOLUTION AND REENGINEERING (SANER 2022), 2022, : 112 - 122
- [7] Chen Pengfei, 2019, P MACHINE LEARNING R, V97
- [8] Identifying Dormant Functionality in Malware Programs [J]. 2010 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, 2010, : 61 - 76
- [9] Devlin J, 2019, 2019 CONFERENCE OF THE NORTH AMERICAN CHAPTER OF THE ASSOCIATION FOR COMPUTATIONAL LINGUISTICS: HUMAN LANGUAGE TECHNOLOGIES (NAACL HLT 2019), VOL. 1, P4171
- [10] Asm2Vec: Boosting Static Representation Robustness for Binary Clone Search against Code Obfuscation and Compiler Optimization [J]. 2019 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2019), 2019, : 472 - 489