1 |
Dullien, Thomas, and Rolf Rolles. "Graph-based comparison of executable objects," SSTIC 5, 2005
|
2 |
Diaphora, "https://github.com/joxeankoret/diaphora"
|
3 |
Chan-Kyu Park, Hyong-Shik Kim, Tae jin Lee, Jae-Cheol Ryou, "Function partitioning methods for malware variant similarity comparison," Journal of The Korea Institute of Information Security & Cryptology, pp.321-330, Apr. 2015
|
4 |
Dale G Peterson. "Patch Tuesday leads to exploit Wednesday," Digital Bond, Oct. 2009
|
5 |
Matt Oh, "Exploit Spotting : Locating Vulnerabilities Out Of Vendor Patches Automatically," Blackhat USA, Jul. 2010
|