共 13 条
- [2] Computer security analysis through decompilation and high-level debugging [J]. EIGHTH WORKING CONFERENCE ON REVERSE ENGINEERING, PROCEEDINGS, 2001, : 375 - 380
- [4] Falleri J., 2014, P 29 ACMIEEE INT C A, P313, DOI DOI 10.1145/2642937.2642982
- [5] The Strengths and Behavioral Quirks of Java']Java Bytecode Decompilers [J]. 2019 19TH IEEE INTERNATIONAL WORKING CONFERENCE ON SOURCE CODE ANALYSIS AND MANIPULATION (SCAM), 2019, : 92 - 102
- [6] Hofmeister J, 2017, 2017 IEEE 24TH INTERNATIONAL CONFERENCE ON SOFTWARE ANALYSIS, EVOLUTION, AND REENGINEERING (SANER), P217, DOI 10.1109/SANER.2017.7884623
- [7] Husain H, 2020, Arxiv, DOI arXiv:1909.09436
- [8] Meaningful Variable Names for Decompiled Code: A Machine Translation Approach [J]. 2018 IEEE/ACM 26TH INTERNATIONAL CONFERENCE ON PROGRAM COMPREHENSION (ICPC 2018), 2018, : 20 - 30
- [9] DIRE: A Neural Approach to Decompiled Identifier Naming [J]. 34TH IEEE/ACM INTERNATIONAL CONFERENCE ON AUTOMATED SOFTWARE ENGINEERING (ASE 2019), 2019, : 640 - 651