共 32 条
[1]
[Anonymous], 2012, Practical malware analysis: the hands-on guide to dissecting malicious software
[2]
[Anonymous], 2004, P INT S COD GEN OPT
[3]
Bacs A., 2012, P DIMVA, P144
[4]
Bellard F., 2005, P ANN TECHN C USENIX
[5]
Cavallaro L, 2008, LECT NOTES COMPUT SC, V5137, P143, DOI 10.1007/978-3-540-70542-0_8
[6]
Clause J., 2007, P 2007 INT S SOFTW T, P196, DOI DOI 10.1145/1273463.1273490
[7]
Crandall J. R., 2006, ACM Transactions on Architecture and Code Optimization, V3, P359, DOI 10.1145/1187976.1187977
[8]
Crandall JR, 2004, INT SYMP MICROARCH, P221
[9]
Dalton M, 2007, CONF PROC INT SYMP C, P482, DOI 10.1145/1273440.1250722
[10]
Dinaburg A, 2008, CCS'08: PROCEEDINGS OF THE 15TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P51