共 78 条
- [41] Marcelli A, 2022, PROCEEDINGS OF THE 31ST USENIX SECURITY SYMPOSIUM, P2099
- [42] SAFE: Self-Attentive Function Embeddings for Binary Similarity [J]. DETECTION OF INTRUSIONS AND MALWARE, AND VULNERABILITY ASSESSMENT (DIMVA 2019), 2019, 11543 : 309 - 329
- [43] Mikolov T, 2013, Arxiv, DOI [arXiv:1301.3781, 10.48550/arXiv.1301.3781]
- [44] Probabilistic Disassembly [J]. 2019 IEEE/ACM 41ST INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING (ICSE 2019), 2019, : 1187 - 1198
- [45] DeepFool: a simple and accurate method to fool deep neural networks [J]. 2016 IEEE CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION (CVPR), 2016, : 2574 - 2582
- [46] NSA, 2019, Ghidra
- [47] Ott M., 2019, NAACL HLT 2019 DEMON
- [48] SoK: Security and Privacy in Machine Learning [J]. 2018 3RD IEEE EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY (EUROS&P 2018), 2018, : 399 - 414
- [49] Pei KX, 2020, Arxiv, DOI [arXiv:2010.00770, 10.48550/arXiv.2010.00770, DOI 10.48550/ARXIV.2010.00770]
- [50] Pei Kexin., 2021, XDA