共 32 条
[11]
Enck William, 2011, P 20 USENIX SEC S, P16
[12]
discovRE: Efficient Cross-Architecture Identification of Bugs in Binary Code
[J].
23RD ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2016),
2016,
[13]
VulSeeker-Pro: Enhanced Semantic Learning Based Binary Vulnerability Seeker with Emulation
[J].
ESEC/FSE'18: PROCEEDINGS OF THE 2018 26TH ACM JOINT MEETING ON EUROPEAN SOFTWARE ENGINEERING CONFERENCE AND SYMPOSIUM ON THE FOUNDATIONS OF SOFTWARE ENGINEERING,
2018,
:803-808
[14]
Grace M.C., 2012, Proceeding 5th ACM conference on Security and Privacy in Wireless and Mobile Networks, Tucson, Arizona, USA, DOI 10.1145/2185448.2185464
[15]
Gu Dawu, 2018, ARXIV180806216CS
[17]
Hemel A., 2011, P 8 WORK C MIN SOFTW, P63, DOI 10.1145/3468744.3468752
[18]
Lehmann D, 2020, PROCEEDINGS OF THE 29TH USENIX SECURITY SYMPOSIUM, P217
[19]
LibD: Scalable and Precise Third-party Library Detection in Android Markets
[J].
2017 IEEE/ACM 39TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING (ICSE),
2017,
:335-346
[20]
MobileFindr: Function Similarity Identification for Reversing Mobile Binaries
[J].
COMPUTER SECURITY (ESORICS 2018), PT I,
2018, 11098
:66-83