共 28 条
- [1] Moser A., Kruegel C., Kirda E., Limits of static analysis for malware detection, Proc. of the 23rd Annual Computer Security Applications Conf. (ACSAC 2007), pp. 421-430, (2007)
- [2] Cui W.D., Kannan J., Wang H.J., Discoverer: Automatic protocol reverse engineering from network traces, Proc. of the 16th USENIX Security Symp. (Security 2007), pp. 199-212, (2007)
- [3] Ma J., Levchenko K., Kreibich C., Savage S., Voelker G.M., Unexpected means of protocol inference, Proc. of the 6th ACM SIGCOMM Conf. on Internet Measurement (IMC 2006, pp. 313-326, (2006)
- [4] Small S., Mason J., Monrose F., Provos N., Stubblefield A., To catch a predator: A natural language approach for eliciting malicious payloads, Proc. of the 17th USENIX Security Symp. (Security 2008), pp. 171-183, (2008)
- [5] Kruegel C., Robertson W., Valeur F., Vigna G., Static disassembly of obfuscated binaries, Proc. of the 13th Conf. on USENIX Security Symp. (Security 2004), (2004)
- [6] Vigna G., Static disassembly and code analysis, Proc. of the Malware Detection, pp. 19-41, (2007)
- [7] Christodorescu M., Kidd N., Goh W.H., String analysis for x86 binaries, Proc. of the 6th ACM SIGPLAN-SIGSOFT Workshop on Program Analysis for Software Tools and Engineering (PASTE 2005), pp. 88-95, (2005)
- [8] Cavadini S., Secure slices of insecure programs, Proc. of the 2008 ACM Symp. on Information, Computer and Communications Security (ASIACCS 2008), pp. 112-122, (2008)
- [9] Linn C., Debray S., Obfuscation of executable code to improve resistance to static disassembly, Proc. of the 10th ACM Conf. on Computer and Communications Security (CCS 2003), pp. 290-299, (2003)
- [10] Nethercote N., Seward J., Valgrind: A framework for heavyweight dynamic binary instrumentation, Proc. of the ACM Conf. on Programming Language Design and Implementation (PLDI 2007), pp. 89-100, (2007)