Acknowledgement
본 연구는 한성대학교 교내학술연구비 지원과제 임
References
- Dong-Hyeok Park, Eui-Jung Myeong, Joobeom Yun. "Efficient Detection of Android Mutant Malwares Using the DEX file", Journal of The Korea Institute of Information Security & Cryptology, 26(4), pp.895-902. 2016. DOI: https://doi.org/10.13089/ JKIISC.2016.26.4.895
- CHA, Sang-Gil, "Software Security and Binary Analysis", Communications of the Korean Institute of Information Scientists and Engineers, 2018, 36.3: 11-16. URL: https://www.koreascience.or.kr/article/JAKO201811553400494.page
- Taeeun Kim, et al., "A Study on Hybrid Fuzzing using Dynamic Analysis for Automatic Binary Vulnerability Detection", Journal of the Korea Academia- Industrial cooperation Society, 2019, 20.6: 541-547. DOI: https://doi.org/10.5762/KAIS.2019.20.6.541
- Ho Cheul Jung, Young Ghyu Sun, Donggu Lee, Soo Hyun Kim, Yu Min Hwang, Issac Sim, Sang Keun Oh, Seung-Ho Song, Jin Young Kim, "Prediction for Energy Demand Using 1D-CNN and Bidirectional LSTM in Internet of Energy", Institute of Korean Electrical and ElectronicsEngineers, (2019) 23(1), 134-142. DOI: http://dx.doi.org/10.7471/ikeee.2019.23.1.134
- Hwang, Seong Oun, "A Methodology for Security Vulnerability Assessment Process on Binary Code", The Journal of The Institute of Internet, Broadcasting and Communication, vol. 12, no. 5, pp.237-242, Oct. 2012. DOI: https://doi.org/10.7236/JIWIT.2012.12.5.237
- Jianming Fu, Rui Jin, Yan Lin, Baihe Jiang, Zhengwei Guo, "Function Risk Assessment Under Memory Leakage", Networking and Network Applications (NaNA) 2018 International Conference on, pp.284-291, 2018. DOI: https://doi.org/10.1109/NANA.2018.8648754
- BRUMLEY, David, et al., "BAP: A binary analysis platform", International Conference on Computer Aided Verification. Springer, Berlin, Heidelberg, pp.463-469. 2011. DOI: https://doi.org/10.1007/978-3-642-22110-1_37
- SHIN, Eui Chul Richard; SONG, Dawn; MOAZZEZI, Reza., "Recognizing functions in binaries with neural networks", 24th USENIX Security Symposium (USENIX Security 15). pp.611-626, 2015. URL: https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/shin
- DAVID, Yaniv; ALON, Uri; YAHAV, Eran, "Neural reverse engineering of stripped binaries using augmented control flow graphs", Proceedings of the ACM on Programming Languages, 2020, 4.OOPSLA: 1-28. DOI: https://doi.org/10.1145/3428293
- Laune C. Harris and Barton P. Miller, "Practical analysis of stripped binary code", SIGARCH Comput. Archit. News 33, 5, , pp.63-68, December 2005. DOI: https://doi.org/10.1145/1127577.1127590