Acknowledgement
Supported by : 정보통신기술진흥센터, 국가 보안 기술 연구소
References
- L. Luo, J. Ming, D. Wu, P. Liu, and S. Zhu, "Semantics-Based Obfuscation-Resilient Binary Code Similarity Comparsion with Applications to Software Plagiarism Detection," Proc. of the 22nd ACM SIGSOFT International Symposium on Foundations of Software Engineering, pp. 389-400, Nov. 2014.
- X. Hu, T. Chiueh, and K. G. Shin, "Large-Scale Malware Indexing Using Function-Call Graphs," Proc. of the 2009 ACM Conference on Computer and Communications Security, pp. 611-620 Nov. 2009.
- M. Egele, M. Woo, P. Chapman, and D. Brumley, "Blanket Execution: Dynamic Similarity Testing for Program Binaries and Components," Proc. of the 23rd USENIX Security Symposium, pp. 303-317, Aug. 2014.
- J. H. Park, Y. S. Choi, and J. M. Choi, "Software Similarity Analysis via Stack Usage Pattern," Journal of KIISE : Computing Practices and Letters, Vol. 20, No. 6, pp. 349-353, Jun. 2014. (in Korean)
- Y. David, N. Partush, and E. Yahav, "Statistical Similarity of Binaries," Proc. of the 37th ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI), pp. 266-280, Jun. 2016.
- Hex-Rays (2005), IDA F.L.I.R.T. Technology: In-Depth [Online] Available https://www.hex-rays.com/products/ida/tech/flirt/in_depth.shtml
- H. Park, S. Choi, S. Seo, and T. Han, "Analyzing Differences of Binary Executable Files using Program Structure and Constant Values," Journal of KIISE : Software and Applications, Vol. 35, No. 7, pp. 452-461, Sep. 2008. (in Korean)
- D. Kim, and S. Cho, "Detection of Open-Source Software Module based on Function-level Features," Journal of KIISE, Vol. 42, No. 6, pp. 713-722, Jun, 2015. (in Korean) https://doi.org/10.5626/JOK.2015.42.6.713
- Y. Kim, E.-S. Cho, "Similarity Analysis on Different Versions of Same Functions," Proc. of KIISE Korea Computer Congress 2016, pp. 760-762, Dec. 2016. (in Korean)
- J.-C. Choi, and S.-J. Cho, "Open Source Software Detection based on Opcde k-gram at Binary Code Level," Journal of KIISE : Computer Systems and Theory, Vol. 41, No. 1, pp. 23-32, Feb. 2014. (in Korean)
- P. P.F. Chan, and C. Collberg, "A Method to Evaluate CFG Comparison Algorithms," 2014 14th International Conference on Quality Software (QSIC), pp. 95-104, 2014.
- T. Bao, J. Burket, M. Woo, R. Turner, and D. Brumley, "ByteWeight: Leraning to Recognize Functions in Binary Code," Proc. of the 23rd USENIX Security Symposium, pp. 845-860, Aug. 2014.
- J. Makhoul, F. Kubala, R. Schwartz, and R. Weischedel, "Performance measures for information extraction," DARPA Broadcast News Workshop, 1999.