共 22 条
- [1] Bromley J., 1993, International Journal of Pattern Recognition and Artificial Intelligence, V7, P669, DOI 10.1142/S0218001493000339
- [2] Cho K, 2014, PREPRINT
- [3] David Y, 2018, ACM SIGPLAN NOTICES, V53, P392, DOI [10.1145/3296957.3177157, 10.1145/3173162.3177157]
- [4] David Y, 2016, ACM SIGPLAN NOTICES, V51, P266, DOI [10.1145/2908080.2908126, 10.1145/2980983.2908126]
- [5] Devlin J, 2019, 2019 CONFERENCE OF THE NORTH AMERICAN CHAPTER OF THE ASSOCIATION FOR COMPUTATIONAL LINGUISTICS: HUMAN LANGUAGE TECHNOLOGIES (NAACL HLT 2019), VOL. 1, P4171
- [6] Asm2Vec: Boosting Static Representation Robustness for Binary Clone Search against Code Obfuscation and Compiler Optimization [J]. 2019 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2019), 2019, : 472 - 489
- [7] Feng Q., 2016, P ACM SIGSAC C COMP, P480
- [8] αDiff: Cross-Version Binary Code Similarity Detection with DNN [J]. PROCEEDINGS OF THE 2018 33RD IEEE/ACM INTERNATIONAL CONFERENCE ON AUTOMTED SOFTWARE ENGINEERING (ASE' 18), 2018, : 667 - 678
- [9] FuncNet: A Euclidean Embedding Approach for Lightweight Cross-platform Binary Recognition [J]. SECURITY AND PRIVACY IN COMMUNICATION NETWORKS, SECURECOMM, PT I, 2019, 304 : 319 - 337
- [10] Semantic-Based Representation Binary Clone Detection for Cross-Architectures in the Internet of Things [J]. APPLIED SCIENCES-BASEL, 2019, 9 (16):