共 78 条
- [2] Nibbler: Debloating Binary Shared Libraries [J]. 35TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSA), 2019, : 70 - 83
- [3] Adversarial Deep Learning for Robust Detection of Binary Encoded Malware [J]. 2018 IEEE SYMPOSIUM ON SECURITY AND PRIVACY WORKSHOPS (SPW 2018), 2018, : 76 - 82
- [4] Compiler-Agnostic Function Detection in Binaries [J]. 2017 IEEE EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY (EUROS&P), 2017, : 177 - 189
- [5] Andriesse D, 2016, PROCEEDINGS OF THE 25TH USENIX SECURITY SYMPOSIUM, P583
- [6] Athalye A, 2018, PR MACH LEARN RES, V80
- [7] Axelsson Stefan, 2000, The Base-Rate Fallacy and the Difficulty of Intrusion Detection, V3, P20
- [8] Brown TB, 2020, Arxiv, DOI arXiv:2005.14165
- [9] Bao T, 2014, PROCEEDINGS OF THE 23RD USENIX SECURITY SYMPOSIUM, P845
- [10] Superset Disassembly: Statically Rewriting x86 Binaries Without Heuristics [J]. 25TH ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2018), 2018,