共 46 条
[1]
America T.-L. R, KAS MOB
[2]
[Anonymous], 2015, P 31 ANN COMP SEC AP
[3]
[Anonymous], 2013, Proceedings of ACM Conference on Data and Application Security and Privacy (CODASPY)
[4]
Bekrar S, 2012, P 5 IEEE INT C SOFTW
[5]
Brook C, TRAVEL ROUTERS NAS D
[6]
Input Generation via Decomposition and Re-Stitching: Finding Bugs in Malware
[J].
PROCEEDINGS OF THE 17TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'10),
2010,
:413-425
[7]
Caballero J, 2009, CCS'09: PROCEEDINGS OF THE 16TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P621
[8]
EdgeMiner: Automatically Detecting Implicit Control Flow Transitions through the Android Framework
[J].
22ND ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2015),
2015,
[9]
Towards Automated Dynamic Analysis for Linux-based Embedded Firmware
[J].
23RD ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2016),
2016,
[10]
Chen K., 2009, REVERSING EXPLOITING