|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 258 occurrences of 202 keywords
|
|
|
Results
Found 355 publication records. Showing 355 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
96 | M. Zubair Shafiq, S. Momina Tabish, Fauzan Mirza, Muddassar Farooq |
PE-Miner: Mining Structural Information to Detect Malicious Executables in Realtime. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RAID ![In: Recent Advances in Intrusion Detection, 12th International Symposium, RAID 2009, Saint-Malo, France, September 23-25, 2009. Proceedings, pp. 121-141, 2009, Springer, 978-3-642-04341-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Malicious Executable Detection, Portable Executables, Data Mining, Malware Detection, Structural Information |
81 | Mohammad M. Masud 0001, Latifur Khan, Bhavani Thuraisingham |
A scalable multi-level feature extraction technique to detect malicious executables. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inf. Syst. Frontiers ![In: Inf. Syst. Frontiers 10(1), pp. 33-45, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Malicious executable, n-gram analysis, Feature extraction, Disassembly |
81 | Matthew G. Schultz, Eleazar Eskin, Erez Zadok, Salvatore J. Stolfo |
Data Mining Methods for Detection of New Malicious Executables. ![Search on Bibsonomy](Pics/bibsonomy.png) |
S&P ![In: 2001 IEEE Symposium on Security and Privacy, Oakland, California, USA May 14-16, 2001, pp. 38-49, 2001, IEEE Computer Society, 0-7695-1046-9. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
69 | Jyh-Herng Chow, Yong-Fong Lee, Kalyan Muthukumar, Vivek Sarkar, Mauricio J. Serrano, Iris Garcia, John Hsu, Shauchi Ong, Honesty C. Young |
Optimized code restructuring of OS/2 executables. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CASCON ![In: Proceedings of the 1995 Conference of the Centre for Advanced Studies on Collaborative Research, November 7-9, 1995, Toronto, Ontario, Canada, pp. 12, 1995, IBM. The full citation details ...](Pics/full.jpeg) |
1995 |
DBLP BibTeX RDF |
|
60 | Bertrand Anckaert, Bjorn De Sutter, Dominique Chanet, Koen De Bosschere |
Steganography for Executables and Code Transformation Signatures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISC ![In: Information Security and Cryptology - ICISC 2004, 7th International Conference, Seoul, Korea, December 2-3, 2004, Revised Selected Papers, pp. 425-439, 2004, Springer, 3-540-26226-1. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
code transformation signature, steganography, executables |
57 | Yongtao Hu, Liang Chen, Ming Xu 0001, Ning Zheng 0001, Yanhua Guo |
Unknown Malicious Executables Detection Based on Run-Time Behavior. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FSKD (4) ![In: Fifth International Conference on Fuzzy Systems and Knowledge Discovery, FSKD 2008, 18-20 October 2008, Jinan, Shandong, China, Proceedings, Volume 4, pp. 391-395, 2008, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
57 | Jeremy Z. Kolter, Marcus A. Maloof |
Learning to detect malicious executables in the wild. ![Search on Bibsonomy](Pics/bibsonomy.png) |
KDD ![In: Proceedings of the Tenth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Seattle, Washington, USA, August 22-25, 2004, pp. 470-478, 2004, ACM, 1-58113-888-1. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
security, data mining, concept learning, malicious software |
48 | Andreas Stamminger, Christopher Kruegel, Giovanni Vigna, Engin Kirda |
Automated Spyware Collection and Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 12th International Conference, ISC 2009, Pisa, Italy, September 7-9, 2009. Proceedings, pp. 202-217, 2009, Springer, 978-3-642-04473-1. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
48 | Yingxu Lai, Zenghui Liu |
Unknown Malicious Identification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
World Congress on Engineering (Selected Papers) ![In: Advances in Electrical Engineering and Computational Science, [revised and extended papers from the World Congress on Engineering, WCE 2008, London, UK, July 2-4, 2008], pp. 301-312, 2008, Springer, 978-90-481-2310-0. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Unknown malicious detection, Half Increment Naive Bayes, classification |
48 | Roch H. Glitho, Bertrand E. Lenou, Samuel Pierre |
Handling Subscription in a Mobile Agent-Based Service Environment for Internet Telephony: Swapping Agents. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MATA ![In: Mobile Agents for Telecommunication Applications, Second International Workshop, MATA 2000, Paris, France, September 18-20, 2000, Proceedings, pp. 49-66, 2000, Springer, 3-540-41069-4. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
48 | Ákos Kiss 0001, Judit Jász, Tibor Gyimóthy |
Using Dynamic Information in the Interprocedural Static Slicing of Binary Executables. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Softw. Qual. J. ![In: Softw. Qual. J. 13(3), pp. 227-245, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
interprocedural slicing, binary executables, indirect function call, call graph, dynamic information, static slicing |
45 | Wen Fu, Rongcai Zhao, Jianmin Pang, Jingbo Zhang |
Recovering Variable-Argument Functions from Binary Executables. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACIS-ICIS ![In: 7th IEEE/ACIS International Conference on Computer and Information Science, IEEE/ACIS ICIS 2008, 14-16 May 2008, Portland, Oregon, USA, pp. 545-550, 2008, IEEE Computer Society, 978-0-7695-3131-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
variable-argument function, reverse compilation, calling convention, instruction pattern, IA-64 |
45 | Gogul Balakrishnan, Thomas W. Reps |
Analyzing Stripped Device-Driver Executables. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TACAS ![In: Tools and Algorithms for the Construction and Analysis of Systems, 14th International Conference, TACAS 2008, Held as Part of the Joint European Conferences on Theory and Practice of Software, ETAPS 2008, Budapest, Hungary, March 29-April 6, 2008. Proceedings, pp. 124-140, 2008, Springer, 978-3-540-78799-0. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
45 | Jingbo Zhang, Wen Fu, Jianmin Pang, Rongcai Zhao |
Using Propositional Calculas to Accurately Structure Control-Flow from Binary Executables. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSSE (2) ![In: International Conference on Computer Science and Software Engineering, CSSE 2008, Volume 2: Software Engineering, December 12-14, 2008, Wuhan, China, pp. 338-341, 2008, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
45 | Roberto Perdisci, Andrea Lanzi, Wenke Lee |
McBoost: Boosting Scalability in Malware Collection and Analysis Using Statistical Classification of Executables. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Twenty-Fourth Annual Computer Security Applications Conference, ACSAC 2008, Anaheim, California, USA, 8-12 December 2008, pp. 301-310, 2008, IEEE Computer Society, 978-0-7695-3447-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
45 | Seokwoo Choi, Heewan Park, Hyun-il Lim, Taisook Han |
A Static Birthmark of Binary Executables Based on API Call Structure. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIAN ![In: Advances in Computer Science - ASIAN 2007. Computer and Network Security, 12th Asian Computing Science Conference, Doha, Qatar, December 9-11, 2007, Proceedings, pp. 2-16, 2007, Springer, 978-3-540-76927-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
software piracy, binary analysis, software birthmark |
45 | Danny Nebenzahl, Shmuel Sagiv, Avishai Wool |
Install-Time Vaccination of Windows Executables to Defend against Stack Smashing Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Dependable Secur. Comput. ![In: IEEE Trans. Dependable Secur. Comput. 3(1), pp. 78-90, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Computer security, instrumentation, buffer overflow |
45 | Gogul Balakrishnan, Radu Gruian, Thomas W. Reps, Tim Teitelbaum |
CodeSurfer/x86-A Platform for Analyzing x86 Executables. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CC ![In: Compiler Construction, 14th International Conference, CC 2005, Held as Part of the Joint European Conferences on Theory and Practice of Software, ETAPS 2005, Edinburgh, UK, April 4-8, 2005, Proceedings, pp. 250-254, 2005, Springer, 3-540-25411-0. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
45 | Zhenhe Guo, Zhengkai Liu, Ying Tan 0002 |
An NN-Based Malicious Executables Detection Algorithm Based on Immune Principles. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISNN (2) ![In: Advances in Neural Networks - ISNN 2004, International Symposium on Neural Networks, Dalian, China, August 19-21, 2004, Proceedings, Part II, pp. 675-680, 2004, Springer, 3-540-22843-8. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
45 | Cristina Cifuentes, Antoine Fraboulet |
Intraprocedural Static Slicing of Binary Executables. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICSM ![In: 1997 International Conference on Software Maintenance (ICSM '97), 1-3 October 1997, Bari, Italy, Proceedings, pp. 188-, 1997, IEEE Computer Society, 0-8186-8013-X. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
goto jumps, reverse engineering, binary code, disassembly, Static slicing |
45 | Sashikanth Chandrasekaran, Mark D. Hill |
Optimistic Simulation of Parallel Architectures Using Program Executables. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Workshop on Parallel and Distributed Simulation ![In: Proceedings of the Tenth Workshop on Parallel and Distributed Simulation, PADS '96, Philadelphia, PA, USA, May 22-24, 1996, pp. 143-150, 1996, IEEE Computer Society, 0-8186-7539-X. The full citation details ...](Pics/full.jpeg) |
1996 |
DBLP DOI BibTeX RDF |
Parallel Machines, Optimistic Simulation, State Saving, Direct Execution |
41 | Eddy Deligne |
Hyperviseur de protection d'exécutables - Etude, développement et discussion. (Hypervisor for executables protection - design, development and discussion). ![Search on Bibsonomy](Pics/bibsonomy.png) |
|
2014 |
RDF |
|
40 | George M. Mohay, J. Zellers |
Kernel and Shell-Based Applications Integrity Assurance. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 13th Annual Computer Security Applications Conference (ACSAC 1997), 8-12 December 1997, San Diego, CA, USA, pp. 34-43, 1997, IEEE Computer Society, 0-8186-8274-4. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
kernel-based applications integrity assurance, shell-based applications integrity assurance, software authenticity verification, CASS project, Computer Architecture for Secure Systems, UNIX SVR4.2, Mach 3.0 microkernel, portable shell, UNIX-style platforms, security, data integrity, operating system, executables, computer viruses, integrity checking, implementation issues |
36 | Marius Nita, David Notkin |
White-box approaches for improved testing and analysis of configurable software systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICSE Companion ![In: 31st International Conference on Software Engineering, ICSE 2009, May 16-24, 2009, Vancouver, Canada, Companion Volume, pp. 307-310, 2009, IEEE, 978-1-4244-3494-7. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
36 | Yingxu Lai |
A Feature Selection for Malicious Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SNPD ![In: Ninth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing, SNPD 2008, In conjunction with Second International Workshop on Advanced Internet Technology and Applications, August 6-8, 2008, Phuket, Thailand, pp. 365-370, 2008, IEEE Computer Society, 978-0-7695-3263-9. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
unknown malicious detection, classification, SVM, feature selection |
36 | Gogul Balakrishnan, Thomas W. Reps |
Recency-Abstraction for Heap-Allocated Storage. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAS ![In: Static Analysis, 13th International Symposium, SAS 2006, Seoul, Korea, August 29-31, 2006, Proceedings, pp. 221-239, 2006, Springer, 3-540-37756-5. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
36 | Samik Basu 0001, Prem Uppuluri |
Proxy-Annotated Control Flow Graphs: Deterministic Context-Sensitive Monitoring for Intrusion Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDCIT ![In: Distributed Computing and Internet Technology, First International Conference, ICDCIT 2004, Bhubaneswar, India, December 22-24, 2004, Proceedings, pp. 353-362, 2004, Springer, 3-540-24075-6. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
36 | Jesse C. Rabek, Roger I. Khazan, Scott M. Lewandowski, Robert K. Cunningham |
Detection of injected, dynamically generated, and obfuscated malicious code. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WORM ![In: Proceedings of the 2003 ACM Workshop on Rapid Malcode, WORM 2003, Washington, DC, USA, October 27, 2003, pp. 76-82, 2003, ACM Press, 1-58113-785-0. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
intrusion detection, static analysis, anomaly detection, dynamic analysis, system calls, code analysis, execution monitoring, malicious code detection |
32 | Pranith D. Kumar, Anchal Nema, Rajeev Kumar |
Hybrid analysis of executables to detect security vulnerabilities: security vulnerabilities. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISEC ![In: Proceeding of the 2nd Annual India Software Engineering Conference, ISEC 2009, Pune, India, February 23-26, 2009, pp. 141-142, 2009, ACM, 978-1-60558-426-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
hybrid analysis, instrumentation, slicing, security vulnerabilities, memory errors |
32 | Boris Rozenberg, Ehud Gudes, Yuval Elovici, Yuval Fledel |
Method for Detecting Unknown Malicious Executables. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RAID ![In: Recent Advances in Intrusion Detection, 12th International Symposium, RAID 2009, Saint-Malo, France, September 23-25, 2009. Proceedings, pp. 376-377, 2009, Springer, 978-3-642-04341-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
32 | Andreas Sæbjørnsen, Jeremiah Willcock, Thomas Panas, Daniel J. Quinlan, Zhendong Su 0001 |
Detecting code clones in binary executables. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISSTA ![In: Proceedings of the Eighteenth International Symposium on Software Testing and Analysis, ISSTA 2009, Chicago, IL, USA, July 19-23, 2009, pp. 117-128, 2009, ACM, 978-1-60558-338-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
software tools, clone detection, binary analysis |
32 | Fanchen Su, Zhiyi Yin, Haitao Yao, Jianming Fu, Fuxi Zhu |
Fingerprint Extraction of Executables Based on the Potential Field Graph of Callgraph. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSSE (3) ![In: International Conference on Computer Science and Software Engineering, CSSE 2008, Volume 3: Grid Computing / Distributed and Parallel Computing / Information Security, December 12-14, 2008, Wuhan, China, pp. 974-977, 2008, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
32 | Jingbo Zhang, Rongcai Zhao, Jianmin Pang |
Parameter and Return-value Analysis of Binary Executables. ![Search on Bibsonomy](Pics/bibsonomy.png) |
COMPSAC (1) ![In: 31st Annual International Computer Software and Applications Conference, COMPSAC 2007, Beijing, China, July 24-27, 2007. Volume 1, pp. 501-508, 2007, IEEE Computer Society, 978-0-7695-2870-0. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
32 | Tao Wei, Jian Mao, Wei Zou, Yu Chen |
Structuring 2-way Branches in Binary Executables. ![Search on Bibsonomy](Pics/bibsonomy.png) |
COMPSAC (1) ![In: 31st Annual International Computer Software and Applications Conference, COMPSAC 2007, Beijing, China, July 24-27, 2007. Volume 1, pp. 115-118, 2007, IEEE Computer Society, 978-0-7695-2870-0. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
32 | Rathijit Sen, Y. N. Srikant |
WCET estimation for executables in the presence of data caches. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EMSOFT ![In: Proceedings of the 7th ACM & IEEE International conference on Embedded software, EMSOFT 2007, September 30 - October 3, 2007, Salzburg, Austria, pp. 203-212, 2007, ACM, 978-1-59593-825-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
32 | Gogul Balakrishnan, Thomas W. Reps |
DIVINE: DIscovering Variables IN Executables. ![Search on Bibsonomy](Pics/bibsonomy.png) |
VMCAI ![In: Verification, Model Checking, and Abstract Interpretation, 8th International Conference, VMCAI 2007, Nice, France, January 14-16, 2007, Proceedings, pp. 1-28, 2007, Springer, 978-3-540-69735-0. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
32 | Junghee Lim, Thomas W. Reps, Ben Liblit |
Extracting Output Formats from Executables. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WCRE ![In: 13th Working Conference on Reverse Engineering (WCRE 2006), 23-27 October 2006, Benevento, Italy, pp. 167-178, 2006, IEEE Computer Society, 0-7695-2719-1. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
32 | Marco Cova, Viktoria Felmetsger, Greg Banks, Giovanni Vigna |
Static Detection of Vulnerabilities in x86 Executables. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 22nd Annual Computer Security Applications Conference (ACSAC 2006), 11-15 December 2006, Miami Beach, Florida, USA, pp. 269-278, 2006, IEEE Computer Society, 0-7695-2716-7. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
binary static analysis, symbolic execution, Vulnerability analysis, taint analysis |
32 | Noah Snavely, Saumya K. Debray, Gregory R. Andrews |
Unpredication, Unscheduling, Unspeculation: Reverse Engineering Itanium Executables. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Software Eng. ![In: IEEE Trans. Software Eng. 31(2), pp. 99-115, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
EPIC architectures, Reverse engineering, speculation, code optimization, predication |
32 | Gogul Balakrishnan, Thomas W. Reps, Nicholas Kidd, Akash Lal, Junghee Lim, David Melski, Radu Gruian, Suan Hsi Yong, Chi-Hua Chen, Tim Teitelbaum |
Model Checking x86 Executables with CodeSurfer/x86 and WPDS++. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CAV ![In: Computer Aided Verification, 17th International Conference, CAV 2005, Edinburgh, Scotland, UK, July 6-10, 2005, Proceedings, pp. 158-163, 2005, Springer, 3-540-27231-3. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
32 | Gogul Balakrishnan, Thomas W. Reps |
Analyzing Memory Accesses in x86 Executables. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CC ![In: Compiler Construction, 13th International Conference, CC 2004, Held as Part of the Joint European Conferences on Theory and Practice of Software, ETAPS 2004, Barcelona, Spain, March 29 - April 2, 2004, Proceedings, pp. 5-23, 2004, Springer, 3-540-21297-3. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
32 | Noah Snavely, Saumya K. Debray, Gregory R. Andrews |
Unscheduling, Unpredication, Unspeculation: Reverse Engineering Itanium Executables. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WCRE ![In: 10th Working Conference on Reverse Engineering, WCRE 2003, Victoria, Canada, November 13-16, 2003, pp. 4-13, 2003, IEEE Computer Society, 0-7695-2027-8. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
32 | Ákos Kiss 0001, Judit Jász, Gábor Lehotai, Tibor Gyimóthy |
Interprocedural Static Slicing of Binary Executables. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCAM ![In: 3rd IEEE International Workshop on Source Code Analysis and Manipulation (SCAM 2003), 26-27 September 2003, Amsterdam, The Netherlands, pp. 118-, 2003, IEEE Computer Society, 0-7695-2005-7. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
32 | Peter Fritzson, Roland Wismüller, Olav Hansen, Jonas Sala, Peter Skov |
A Parallel Debugger with Support for Distributed Arrays, Multiple Executables and Dynamic Processes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CC ![In: Compiler Construction, 6th International Conference, CC'96, Linköping, Sweden, April 24-26, 1996, Proceedings, pp. 341-355, 1996, Springer, 3-540-61053-7. The full citation details ...](Pics/full.jpeg) |
1996 |
DBLP DOI BibTeX RDF |
|
27 | Jun-Hyung Park, Minsoo Kim 0002, Bong-Nam Noh |
A Visualization Technique for Installation Evidences Containing Malicious Executable Files Using Machine Language Sequence. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISA ![In: Information Security Applications, 9th International Workshop, WISA 2008, Jeju Island, Korea, September 23-25, 2008, Revised Selected Papers, pp. 201-210, 2008, Springer, 978-3-642-00305-9. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Anti-Forensic, Machine language, Malicious executables, opcode visualization, Similarity, Malware, Digital Forensic |
27 | Henrik Theiling |
Extracting safe and precise control flow from binaries. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RTCSA ![In: 7th International Workshop on Real-Time Computing and Applications Symposium (RTCSA 2000), 12-14 December 2000, Cheju Island, South Korea, pp. 23-30, 2000, IEEE Computer Society, 0-7695-0930-4. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
safe precise control flow extraction, binary executables, instruction sequence clustering, branch targets, block boundaries, safety-critical real-time systems, graph approximation, entry points, instruction blocks, instruction routines, real-time systems, uncertainties, sequences, safety-critical software, program diagnostics, control flow graph, program control structures, static program analysis, flow graphs, bottom-up approach |
24 | Qijun Gu |
Efficient code diversification for network reprogramming in sensor networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISEC ![In: Proceedings of the Third ACM Conference on Wireless Network Security, WISEC 2010, Hoboken, New Jersey, USA, March 22-24, 2010, pp. 145-150, 2010, ACM, 978-1-60558-923-7. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
code diversity, code security, deluge, tinyos, network reprogramming |
24 | Yanfang Ye 0001, Lifei Chen, Dingding Wang 0001, Tao Li 0001, Qingshan Jiang, Min Zhao |
SBMDS: an interpretable string based malware detection system using SVM ensemble with bagging. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Comput. Virol. ![In: J. Comput. Virol. 5(4), pp. 283-293, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
24 | Emilio Wuerges, Luiz C. V. dos Santos, Olinto J. V. Furtado, Sandro Rigo |
An early real-time checker for retargetable compile-time analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SBCCI ![In: Proceedings of the 22st Annual Symposium on Integrated Circuits and Systems Design: Chip on the Dunes, SBCCI 2009, Natal, Brazil, August 31 - September 3, 2009, 2009, ACM, 978-1-60558-705-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
compile-time WCET analysis, time-constraint feasibility analysis |
24 | M. Zubair Shafiq, S. Momina Tabish, Muddassar Farooq |
On the appropriateness of evolutionary rule learning algorithms for malware detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GECCO (Companion) ![In: Genetic and Evolutionary Computation Conference, GECCO 2009, Proceedings, Montreal, Québec, Canada, July 8-12, 2009, Companion Material, pp. 2609-2616, 2009, ACM, 978-1-60558-505-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
learning classifier systems, malware detection, genetics based machine learning |
24 | M. Zubair Shafiq, S. Momina Tabish, Muddassar Farooq |
Are evolutionary rule learning algorithms appropriate for malware detection? ![Search on Bibsonomy](Pics/bibsonomy.png) |
GECCO ![In: Genetic and Evolutionary Computation Conference, GECCO 2009, Proceedings, Montreal, Québec, Canada, July 8-12, 2009, pp. 1915-1916, 2009, ACM, 978-1-60558-325-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
malware detection, genetics based machine learning |
24 | Yanfang Ye 0001, Dingding Wang 0001, Tao Li 0001, Dongyi Ye, Qingshan Jiang |
An intelligent PE-malware detection system based on association mining. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Comput. Virol. ![In: J. Comput. Virol. 4(4), pp. 323-334, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
24 | Robert Moskovitch, Clint Feher, Nir Tzachar, Eugene Berger, Marina Gitelman, Shlomi Dolev, Yuval Elovici |
Unknown Malcode Detection Using OPCODE Representation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EuroISI ![In: Intelligence and Security Informatics, First European Conference, EuroISI 2008, Esbjerg, Denmark, December 3-5, 2008. Proceedings, pp. 204-215, 2008, Springer, 978-3-540-89899-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
OpCode, Classification, Malicious Code Detection |
24 | Daniel Bilar |
On callgraphs and generative mechanisms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Comput. Virol. ![In: J. Comput. Virol. 3(4), pp. 299-310, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
24 | Daniel Bilar |
On callgraphs and generative mechanisms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Comput. Virol. ![In: J. Comput. Virol. 3(4), pp. 285-297, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
24 | Tao Wei, Jian Mao, Wei Zou, Yu Chen |
A New Algorithm for Identifying Loops in Decompilation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAS ![In: Static Analysis, 14th International Symposium, SAS 2007, Kongens Lyngby, Denmark, August 22-24, 2007, Proceedings, pp. 170-183, 2007, Springer, 978-3-540-74060-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Loop identifying, Unstructuredness coefficient, Control flow analysis, Decompilation |
24 | Salvador Trujillo, Don S. Batory, Oscar Díaz |
Feature Oriented Model Driven Development: A Case Study for Portlets. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICSE ![In: 29th International Conference on Software Engineering (ICSE 2007), Minneapolis, MN, USA, May 20-26, 2007, pp. 44-53, 2007, IEEE Computer Society, 0-7695-2828-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
24 | Krishna Sandeep Reddy Dubba, Arun K. Pujari |
N-gram analysis for computer virus detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Comput. Virol. ![In: J. Comput. Virol. 2(3), pp. 231-239, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
24 | Abdur Rakib, Oleg Parshin, Stephan Thesing, Reinhard Wilhelm |
Component-Wise Instruction-Cache Behavior Prediction. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ATVA ![In: Automated Technology for Verification and Analysis: Second International Conference, ATVA 2004, Taipei, Taiwan, ROC, October 31-November 3, 2004. Proceedings, pp. 211-229, 2004, Springer, 3-540-23610-4. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
24 | Cullen Linn, Saumya K. Debray |
Obfuscation of executable code to improve resistance to static disassembly. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 10th ACM Conference on Computer and Communications Security, CCS 2003, Washington, DC, USA, October 27-30, 2003, pp. 290-299, 2003, ACM, 1-58113-738-9. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
disassembly, code obfuscation |
24 | Amitabh Srivastava |
Emerging opportunities for binary tools. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGARCH Comput. Archit. News ![In: SIGARCH Comput. Archit. News 29(1), pp. 26, 2001. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
24 | Saumya K. Debray, William S. Evans, Robert Muth, Bjorn De Sutter |
Compiler techniques for code compaction. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Program. Lang. Syst. ![In: ACM Trans. Program. Lang. Syst. 22(2), pp. 378-415, 2000. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
code compression, code size reduction, code compaction |
24 | Kiyoko F. Aoki, D. T. Lee |
A Web-Based Distributed Programming Environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HPCN ![In: High-Performance Computing and Networking, 8th International Conference, HPCN Europe 2000, Amsterdam, The Netherlands, May 8-10, 2000, Proceedings, pp. 237-246, 2000, Springer, 3-540-67553-1. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
24 | Claudia Eckert 0001, Markus Pizka |
Improving Resource Management in Distributed Systems using Language-Level Structuring Concepts. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Supercomput. ![In: J. Supercomput. 13(1), pp. 33-55, 1999. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
distributed system, resource management, programming language |
24 | Keith D. Cooper, Nathaniel McIntosh |
Enhanced Code Compression for Embedded RISC Processors. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PLDI ![In: Proceedings of the 1999 ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI), Atlanta, Georgia, USA, May 1-4, 1999, pp. 139-149, 1999, ACM, 1-58113-094-5. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
|
20 | Syed Khurram Jah Rizvi, Muhammad Moazam Fraz |
Robust malware clustering of windows portable executables using ensemble latent representation and distribution modeling. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Concurr. Comput. Pract. Exp. ![In: Concurr. Comput. Pract. Exp. 35(8), 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
20 | Ryuto Omachi, Yasuyuki Murakami |
Packer Identification Method for Multi-Layer Executables Using Entropy Analysis with k-Nearest Neighbor Algorithm. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEICE Trans. Fundam. Electron. Commun. Comput. Sci. ![In: IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 106(3), pp. 355-357, March 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
20 | Meet Udeshi, Prashanth Krishnamurthy, Hammond Pearce, Ramesh Karri, Farshad Khorrami |
REMaQE - Reverse Engineering Math Equations from Executables. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2305.06902, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
20 | Yanzuo Chen, Zhibo Liu, Yuanyuan Yuan, Sihang Hu, Tianxiang Li, Shuai Wang |
Unveiling Single-Bit-Flip Attacks on DNN Executables. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2309.06223, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
20 | Sai Bala Subrahmanyam Singam, Goutham Pooloth, Vasanth Kumar Reddy Ambati, C. V. Bijitha, Hiran V. Nath |
A hybrid method for analysis and detection of malicious executables in IoT network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Secur. ![In: Comput. Secur. 132, pp. 103339, September 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
20 | Ciprian Teodorov |
G∀min∃: Exploring the Boundary Between Executable Specification Languages and Behavior Analysis Tools. (G∀min∃ : Exploration de la frontière entre les langages de spécification exécutables et les outils d'analyse du comportement). ![Search on Bibsonomy](Pics/bibsonomy.png) |
|
2023 |
RDF |
|
20 | Ziyi Lin, Jinku Li, Bowen Li, Haoyu Ma, Debin Gao, Jianfeng Ma 0001 |
TypeSqueezer: When Static Recovery of Function Signatures for Binary Executables Meets Dynamic Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, CCS 2023, Copenhagen, Denmark, November 26-30, 2023, pp. 2725-2739, 2023, ACM. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
20 | Zhibo Liu, Yuanyuan Yuan, Shuai Wang 0011, Xiaofei Xie, Lei Ma 0003 |
Decompiling x86 Deep Neural Network Executables. ![Search on Bibsonomy](Pics/bibsonomy.png) |
USENIX Security Symposium ![In: 32nd USENIX Security Symposium, USENIX Security 2023, Anaheim, CA, USA, August 9-11, 2023, pp. 7357-7374, 2023, USENIX Association. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP BibTeX RDF |
|
20 | Yanzuo Chen, Yuanyuan Yuan, Shuai Wang 0011 |
OBSan: An Out-Of-Bound Sanitizer to Harden DNN Executables. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NDSS ![In: 30th Annual Network and Distributed System Security Symposium, NDSS 2023, San Diego, California, USA, February 27 - March 3, 2023, 2023, The Internet Society. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP BibTeX RDF |
|
20 | Jian Gu, Harald C. Gall |
Towards Top-Down Automated Development in Limited Scopes: A Neuro-Symbolic Framework from Expressibles to Executables. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESEC/SIGSOFT FSE ![In: Proceedings of the 31st ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, ESEC/FSE 2023, San Francisco, CA, USA, December 3-9, 2023, pp. 2072-2076, 2023, ACM. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
20 | Dominik Töllner, Christian Dietrich 0001, Illia Ostapyshyn, Florian Rommel, Daniel Lohmann |
MELF: Multivariant Executables for a Heterogeneous World. ![Search on Bibsonomy](Pics/bibsonomy.png) |
USENIX Annual Technical Conference ![In: 2023 USENIX Annual Technical Conference, USENIX ATC 2023, Boston, MA, USA, July 10-12, 2023., pp. 257-273, 2023, USENIX Association. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP BibTeX RDF |
|
20 | Sanghoon Jeon 0004, Minsoo Ryu, Dongyoung Kim, Huy Kang Kim |
Automatically Seed Corpus and Fuzzing Executables Generation Using Test Framework. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Access ![In: IEEE Access 10, pp. 90408-90428, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
20 | Vanessa V. Sochat, Matthieu Muffato, Audrey Stott, Marco De La Pierre, Georgia Stuart |
Automated Cache for Container Executables. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2212.07376, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
20 | Andreas Schaad, Dominik Binder |
Deep-Learning-based Vulnerability Detection in Binary Executables. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2212.01254, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
20 | Zhibo Liu, Yuanyuan Yuan, Shuai Wang 0011, Xiaofei Xie, Lei Ma 0003 |
Decompiling x86 Deep Neural Network Executables. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2210.01075, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
20 | Terence Kelly |
Literate Executables. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Queue ![In: ACM Queue 20(5), pp. 20-32, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
20 | Andreas Schaad, Dominik Binder |
Deep-Learning-Based Vulnerability Detection in Binary Executables. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FPS ![In: Foundations and Practice of Security - 15th International Symposium, FPS 2022, Ottawa, ON, Canada, December 12-14, 2022, Revised Selected Papers, pp. 453-460, 2022, Springer, 978-3-031-30121-6. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
20 | Thomas Ryan Devine, Maximillian Campbell, Mallory Anderson, Dale Dzielski |
SREP+SAST: A Comparison of Tools for Reverse Engineering Machine Code to Detect Cybersecurity Vulnerabilities in Binary Executables. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSCI ![In: International Conference on Computational Science and Computational Intelligence, CSCI 2022, Las Vegas, NV, USA, December 14-16, 2022, pp. 862-869, 2022, IEEE, 979-8-3503-2028-2. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
20 | Nicolaas Weideman, Haoda Wang, Tyler Kann, Spencer Zahabizadeh, Wei-Cheng Wu, Rajat Tandon, Jelena Mirkovic, Christophe Hauser |
Harm-DoS: Hash Algorithm Replacement for Mitigating Denial-of-Service Vulnerabilities in Binary Executables. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RAID ![In: 25th International Symposium on Research in Attacks, Intrusions and Defenses, RAID 2022, Limassol, Cyprus, October 26-28, 2022, pp. 276-291, 2022, ACM, 978-1-4503-9704-9. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
20 | Faezeh Khorram |
A testing framework for executable domain-specific languages. (Un environnement de test pour les langages dédiés exécutables). ![Search on Bibsonomy](Pics/bibsonomy.png) |
|
2022 |
RDF |
|
20 | Sami Ullah, Wenhui Jin, Heekuck Oh |
Efficient Features for Function Matching in Multi-Architecture Binary Executables. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Access ![In: IEEE Access 9, pp. 104950-104968, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
20 | Anandharaju Durai Raju, Ke Wang 0001 |
Echelon: Two-Tier Malware Detection for Raw Executables to Reduce False Alarms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2101.01015, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP BibTeX RDF |
|
20 | Wei-Chieh Chao, Chung-Kuan Chen, Chen-Mou Cheng |
Cryfind: Using Static Analysis to Identify Cryptographic Algorithms in Binary Executables. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DSC ![In: IEEE Conference on Dependable and Secure Computing, DSC 2021, Aizuwakamatsu, Japan, January 30 - February 2, 2021, pp. 1-2, 2021, IEEE, 978-1-7281-7534-8. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
20 | Behrad Garmany |
MENTALESE - an architecture-agnostic analysis framework for binary executables. ![Search on Bibsonomy](Pics/bibsonomy.png) |
|
2021 |
RDF |
|
20 | Karim Eldefrawy, Michael Locasto, Norrathep Rattanavipanon, Hassen Saïdi |
Towards Automated Augmentation and Instrumentation of Legacy Cryptographic Executables: Extended Version. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2004.09713, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP BibTeX RDF |
|
20 | Navid Ordouie, Rasha Almajed, Ramesh K. Karne, Alexander L. Wijesinha, Joel Weymouth, Nirmala Soundararajan |
Transformation Methodology of Binary Executables to Run on Bare Machines. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CATA ![In: Proceedings of 35th International Conference on Computers and Their Applications, CATA 2020, San Francisco, California, USA, March 23-25, 2020., pp. 151-160, 2020, EasyChair. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
20 | Karim Eldefrawy, Michael Locasto, Norrathep Rattanavipanon, Hassen Saïdi |
Towards Automated Augmentation and Instrumentation of Legacy Cryptographic Executables. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACNS (2) ![In: Applied Cryptography and Network Security - 18th International Conference, ACNS 2020, Rome, Italy, October 19-22, 2020, Proceedings, Part II., pp. 364-384, 2020, Springer, 978-3-030-57877-0. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
20 | Jiarun Dai, Yuan Zhang 0009, Zheyue Jiang, Yingtian Zhou, Junyan Chen, Xinyu Xing, Xiaohan Zhang 0001, Xin Tan, Min Yang 0002, Zhemin Yang |
BScout: Direct Whole Patch Presence Test for Java Executables. ![Search on Bibsonomy](Pics/bibsonomy.png) |
USENIX Security Symposium ![In: 29th USENIX Security Symposium, USENIX Security 2020, August 12-14, 2020, pp. 1147-1164, 2020, USENIX Association, 978-1-939133-17-5. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP BibTeX RDF |
|
20 | Jedediah Haile, Sage Havens |
Identifying Ubiquitious Third-Party Libraries in Compiled Executables Using Annotated and Translated Disassembled Code with Supervised Machine Learning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SP (Workshops) ![In: 2020 IEEE Security and Privacy Workshops, SP Workshops, San Francisco, CA, USA, May 21, 2020, pp. 157-162, 2020, IEEE, 978-1-7281-9346-5. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
20 | Ryuto Omachi, Yasuyuki Murakami |
Packer Identification Method for Multi-layer Executables with k-Nearest Neighbor of Entropies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISITA ![In: International Symposium on Information Theory and Its Applications, ISITA 2020, Kapolei, HI, USA, October 24-27, 2020, pp. 504-508, 2020, IEEE, 978-4-88552-330-4. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP BibTeX RDF |
|
20 | Yaniv David |
Similarity in Binary Executables. ![Search on Bibsonomy](Pics/bibsonomy.png) |
|
2020 |
RDF |
|
20 | Zhuo Zhang 0002, Wei You, Guanhong Tao 0001, Guannan Wei 0001, Yonghwi Kwon 0001, Xiangyu Zhang 0001 |
BDA: practical dependence analysis for binary executables by unbiased whole-program path sampling and per-path abstract interpretation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Proc. ACM Program. Lang. ![In: Proc. ACM Program. Lang. 3(OOPSLA), pp. 137:1-137:31, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
20 | Roee Leon, Michael Kiperberg, Anat Anatey Leon Zabag, Amit Resh, Asaf Algawi, Nezer J. Zaidenberg |
Hypervisor-Based White Listing of Executables. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Secur. Priv. ![In: IEEE Secur. Priv. 17(5), pp. 58-67, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
20 | Chariton Karamitas, Athanasios Kehagias |
Function matching between binary executables: efficient algorithms and features. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Comput. Virol. Hacking Tech. ![In: J. Comput. Virol. Hacking Tech. 15(4), pp. 307-323, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
20 | Emre Güler, Cornelius Aschermann, Ali Abbasi 0002, Thorsten Holz |
AntiFuzz: Impeding Fuzzing Audits of Binary Executables. ![Search on Bibsonomy](Pics/bibsonomy.png) |
USENIX Security Symposium ![In: 28th USENIX Security Symposium, USENIX Security 2019, Santa Clara, CA, USA, August 14-16, 2019., pp. 1931-1947, 2019, USENIX Association. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP BibTeX RDF |
|
Displaying result #1 - #100 of 355 (100 per page; Change: ) Pages: [ 1][ 2][ 3][ 4][ >>] |
|