共 26 条
[1]
Abadi M., 2016, 12 USENIX S OPERATIN, V16, P265
[2]
[Anonymous], 2015, IDA PRO DISASSEMBLER
[3]
[Anonymous], 2018, Minisom: minimalistic and numpy-based implementation of the self organizing map
[4]
Malware Similarity Identification Using Call Graph Based System Call Subsequence Features
[J].
2013 33RD IEEE INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS WORKSHOPS (ICDCSW 2013),
2013,
:6-10
[5]
Automatic patch-based exploit generation is possible: Techniques and implications
[J].
PROCEEDINGS OF THE 2008 IEEE SYMPOSIUM ON SECURITY AND PRIVACY,
2008,
:143-+
[6]
BinGo: Cross-Architecture Cross-OS Binary Search
[J].
FSE'16: PROCEEDINGS OF THE 2016 24TH ACM SIGSOFT INTERNATIONAL SYMPOSIUM ON FOUNDATIONS OF SOFTWARE ENGINEERING,
2016,
:678-689
[7]
Dahl GE, 2013, INT CONF ACOUST SPEE, P8609, DOI 10.1109/ICASSP.2013.6639346
[8]
Dai HJ, 2016, PR MACH LEARN RES, V48
[9]
Asm2Vec: Boosting Static Representation Robustness for Binary Clone Search against Code Obfuscation and Compiler Optimization
[J].
2019 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2019),
2019,
:472-489
[10]
Kam1n0: MapReduce-based Assembly Clone Search for Reverse Engineering
[J].
KDD'16: PROCEEDINGS OF THE 22ND ACM SIGKDD INTERNATIONAL CONFERENCE ON KNOWLEDGE DISCOVERY AND DATA MINING,
2016,
:461-470