共 35 条
[1]
Aafer Y, 2013, L N INST COMP SCI SO, V127, P86
[2]
code2vec: Learning Distributed Representations of Code
[J].
PROCEEDINGS OF THE ACM ON PROGRAMMING LANGUAGES-PACMPL,
2019, 3 (POPL)
[3]
Barnett M, 2006, LECT NOTES COMPUT SC, V4111, P364
[5]
Boiman Oren., 2007, NIPS, P177
[6]
Brumley David, 2011, Computer Aided Verification. Proceedings 23rd International Conference, CAV 2011, P463, DOI 10.1007/978-3-642-22110-1_37
[8]
David Y, 2016, ACM SIGPLAN NOTICES, V51, P266, DOI [10.1145/2908080.2908126, 10.1145/2980983.2908126]
[10]
Evaluation of Android Anti Malware Techniques against Dalvik Bytecode Obfuscation
[J].
2014 IEEE 13TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM),
2014,
:414-421