共 14 条
[1]
Compiler-Agnostic Function Detection in Binaries
[J].
2017 IEEE EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY (EUROS&P),
2017,
:177-189
[2]
Assisting Malware Analysis with Symbolic Execution: A Case Study
[J].
CYBER SECURITY CRYPTOGRAPHY AND MACHINE LEARNING (CSCML 2017),
2017, 10332
:171-188
[3]
The ROP Needle: Hiding Trigger-based Injection Vectors via Code Reuse
[J].
SAC '19: PROCEEDINGS OF THE 34TH ACM/SIGAPP SYMPOSIUM ON APPLIED COMPUTING,
2019,
:1962-1970
[4]
Coppa E, 2017, IEEE INT CONF AUTOM, P613, DOI 10.1109/ASE.2017.8115671
[5]
Follner A., 2016, PROC INT S ENG SECUR, P155
[6]
ROPMEMU: A Framework for the Analysis of Complex Code-Reuse Attacks
[J].
ASIA CCS'16: PROCEEDINGS OF THE 11TH ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY,
2016,
:47-58
[7]
Li X., 2018, ROPNN DETECTION ROP
[8]
Lu KJ, 2011, 27TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSAC 2011), P363
[9]
Poulios G., 2015, BLACK HAT US
[10]
Roemer Ryan, 2012, ACM TISSEC