共 50 条
- [31] Detecting Patching of Executables without System Calls PROCEEDINGS OF THE SEVENTH ACM CONFERENCE ON DATA AND APPLICATION SECURITY AND PRIVACY (CODASPY'17), 2017, : 185 - 196
- [32] ANTIFUZZ: Impeding Fuzzing Audits of Binary Executables PROCEEDINGS OF THE 28TH USENIX SECURITY SYMPOSIUM, 2019, : 1931 - 1947
- [33] Mostly Static Program Partitioning of Binary Executables ACM TRANSACTIONS ON PROGRAMMING LANGUAGES AND SYSTEMS, 2009, 31 (05):
- [34] Detecting Forensically Relevant Information From PE Executables 2013 INTERNATIONAL CONFERENCE ON RECENT TRENDS IN INFORMATION TECHNOLOGY (ICRTIT), 2013, : 277 - 282
- [35] CodeGuard: enhancing accuracy in detecting clones within java']java source code FRONTIERS IN COMPUTER SCIENCE, 2024, 6
- [36] Detecting Java']Java Code Clones with Multi-Granularities Based on Bytecode 2017 IEEE 41ST ANNUAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE (COMPSAC), VOL 1, 2017, : 317 - 326
- [39] Efficient Features for Function Matching between Binary Executables 2018 25TH IEEE INTERNATIONAL CONFERENCE ON SOFTWARE ANALYSIS, EVOLUTION AND REENGINEERING (SANER 2018), 2018, : 335 - 345
- [40] A Static Birthmark of Windows Binary Executables based on Strings 2013 SEVENTH INTERNATIONAL CONFERENCE ON INNOVATIVE MOBILE AND INTERNET SERVICES IN UBIQUITOUS COMPUTING (IMIS 2013), 2013, : 734 - 738