1 |
Denis Gopan , Thomas Reps, Low-level library analysis and summarization, Proceedings of the 19th international conference on Computer aided verification, July 03-07, 2007, Berlin, Germany
|
2 |
M. D. Ernst. "Static and Dynamic Analysis: Synergy and Duality", In WODA 2003: ICSE Workshop on Dynamic Analysis, Portland, OR, May 9, 2003.
|
3 |
Byoungyoung Lee , Yuna Kim , Jong Kim, binOb+: a framework for potent and stealthy binary obfuscation, Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security, April 13-16, 2010, Beijing, China
|
4 |
C. Kruegel , W. Robertson , F. Valeur , G. Vigna, "Static disassembly of obfuscated binaries", Proceedings of the 13th conference on USENIX Security Symposium, pp.18-18, 2004.
|
5 |
Gogul Balakrishnan , Thomas Reps, WYSINWYX: What you see is not what you eXecute, ACM Transactions on Programming Languages and Systems (TOPLAS), v.32 n.6, p.1-84, August 2010
|
6 |
E. Carrera et al, "Digital Genome Mapping : Advanced Binary Malware Analysis", Proceedings of 15th Virus Bulletin International Conference, pp.187-197, 2004.
|
7 |
IDA Pro. http://www.datarescue.com/
|
8 |
Yeong-Tae Baek, Ki-Tae Kim, "Framework for Static Control Flow Analysis of Binary Codes," Proc. of The Korea Society of Computer and Information, Vol. 18, No. 2, pp. 67-70, Jul. 2010.
|
9 |
M. Cova, V. Felmetsger, G. Banks, and G. Vigna. "Static Detection of Vulnerabilities in x86 Executables", In Proceedings of the Annual Computer Security Applications Conference (ACSAC), 2006.
|