共 55 条
[1]
ARM64, 2022, Learn the architecture-AArch64 Instruction Set Architecture
[2]
Arp D, 2021, Arxiv, DOI [arXiv:2010.09470, 10.48550/arxiv.2010.09470, DOI 10.48550/ARXIV.2010.09470]
[3]
Bao T, 2014, PROCEEDINGS OF THE 23RD USENIX SECURITY SYMPOSIUM, P845
[4]
Bilge L, 2012, 28TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSAC 2012), P129
[5]
BinDiff, 2022, zynamics BinDiff
[6]
Software Plagiarism Detection: A Graph-based Approach
[J].
PROCEEDINGS OF THE 22ND ACM INTERNATIONAL CONFERENCE ON INFORMATION & KNOWLEDGE MANAGEMENT (CIKM'13),
2013,
:1577-1580
[7]
BinGo: Cross-Architecture Cross-OS Binary Search
[J].
FSE'16: PROCEEDINGS OF THE 2016 24TH ACM SIGSOFT INTERNATIONAL SYMPOSIUM ON FOUNDATIONS OF SOFTWARE ENGINEERING,
2016,
:678-689
[8]
Coreutils, 2022, Coreutils-GNU core utilities
[9]
David Y, 2016, ACM SIGPLAN NOTICES, V51, P266, DOI [10.1145/2980983.2908126, 10.1145/2908080.2908126]
[10]
Asm2Vec: Boosting Static Representation Robustness for Binary Clone Search against Code Obfuscation and Compiler Optimization
[J].
2019 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2019),
2019,
:472-489