The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for executables with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1991-1997 (17) 1998-2000 (22) 2001-2003 (28) 2004 (27) 2005 (18) 2006 (24) 2007 (30) 2008 (31) 2009 (30) 2010-2011 (21) 2012-2014 (20) 2015-2016 (21) 2017 (15) 2018-2019 (20) 2020-2022 (20) 2023 (11)
Publication types (Num. hits)
article(72) book(2) data(1) incollection(1) inproceedings(268) phdthesis(11)
Venues (Conferences, Journals, ...)
CoRR(12) PLDI(8) ACSAC(6) J. Comput. Virol.(6) RAID(6) CC(5) CCS(5) USENIX Security Symposium(4) ACIS-ICIS(3) DIMVA(3) Euro-Par(3) ICC(3) ICSM(3) POPL(3) PVM/MPI(3) VMCAI(3) More (+10 of total 247)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 258 occurrences of 202 keywords

Results
Found 355 publication records. Showing 355 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
96M. Zubair Shafiq, S. Momina Tabish, Fauzan Mirza, Muddassar Farooq PE-Miner: Mining Structural Information to Detect Malicious Executables in Realtime. Search on Bibsonomy RAID The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Malicious Executable Detection, Portable Executables, Data Mining, Malware Detection, Structural Information
81Mohammad M. Masud 0001, Latifur Khan, Bhavani Thuraisingham A scalable multi-level feature extraction technique to detect malicious executables. Search on Bibsonomy Inf. Syst. Frontiers The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Malicious executable, n-gram analysis, Feature extraction, Disassembly
81Matthew G. Schultz, Eleazar Eskin, Erez Zadok, Salvatore J. Stolfo Data Mining Methods for Detection of New Malicious Executables. Search on Bibsonomy S&P The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
69Jyh-Herng Chow, Yong-Fong Lee, Kalyan Muthukumar, Vivek Sarkar, Mauricio J. Serrano, Iris Garcia, John Hsu, Shauchi Ong, Honesty C. Young Optimized code restructuring of OS/2 executables. Search on Bibsonomy CASCON The full citation details ... 1995 DBLP  BibTeX  RDF
60Bertrand Anckaert, Bjorn De Sutter, Dominique Chanet, Koen De Bosschere Steganography for Executables and Code Transformation Signatures. Search on Bibsonomy ICISC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF code transformation signature, steganography, executables
57Yongtao Hu, Liang Chen, Ming Xu 0001, Ning Zheng 0001, Yanhua Guo Unknown Malicious Executables Detection Based on Run-Time Behavior. Search on Bibsonomy FSKD (4) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
57Jeremy Z. Kolter, Marcus A. Maloof Learning to detect malicious executables in the wild. Search on Bibsonomy KDD The full citation details ... 2004 DBLP  DOI  BibTeX  RDF security, data mining, concept learning, malicious software
48Andreas Stamminger, Christopher Kruegel, Giovanni Vigna, Engin Kirda Automated Spyware Collection and Analysis. Search on Bibsonomy ISC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
48Yingxu Lai, Zenghui Liu Unknown Malicious Identification. Search on Bibsonomy World Congress on Engineering (Selected Papers) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Unknown malicious detection, Half Increment Naive Bayes, classification
48Roch H. Glitho, Bertrand E. Lenou, Samuel Pierre Handling Subscription in a Mobile Agent-Based Service Environment for Internet Telephony: Swapping Agents. Search on Bibsonomy MATA The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
48Ákos Kiss 0001, Judit Jász, Tibor Gyimóthy Using Dynamic Information in the Interprocedural Static Slicing of Binary Executables. Search on Bibsonomy Softw. Qual. J. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF interprocedural slicing, binary executables, indirect function call, call graph, dynamic information, static slicing
45Wen Fu, Rongcai Zhao, Jianmin Pang, Jingbo Zhang Recovering Variable-Argument Functions from Binary Executables. Search on Bibsonomy ACIS-ICIS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF variable-argument function, reverse compilation, calling convention, instruction pattern, IA-64
45Gogul Balakrishnan, Thomas W. Reps Analyzing Stripped Device-Driver Executables. Search on Bibsonomy TACAS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
45Jingbo Zhang, Wen Fu, Jianmin Pang, Rongcai Zhao Using Propositional Calculas to Accurately Structure Control-Flow from Binary Executables. Search on Bibsonomy CSSE (2) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
45Roberto Perdisci, Andrea Lanzi, Wenke Lee McBoost: Boosting Scalability in Malware Collection and Analysis Using Statistical Classification of Executables. Search on Bibsonomy ACSAC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
45Seokwoo Choi, Heewan Park, Hyun-il Lim, Taisook Han A Static Birthmark of Binary Executables Based on API Call Structure. Search on Bibsonomy ASIAN The full citation details ... 2007 DBLP  DOI  BibTeX  RDF software piracy, binary analysis, software birthmark
45Danny Nebenzahl, Shmuel Sagiv, Avishai Wool Install-Time Vaccination of Windows Executables to Defend against Stack Smashing Attacks. Search on Bibsonomy IEEE Trans. Dependable Secur. Comput. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Computer security, instrumentation, buffer overflow
45Gogul Balakrishnan, Radu Gruian, Thomas W. Reps, Tim Teitelbaum CodeSurfer/x86-A Platform for Analyzing x86 Executables. Search on Bibsonomy CC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
45Zhenhe Guo, Zhengkai Liu, Ying Tan 0002 An NN-Based Malicious Executables Detection Algorithm Based on Immune Principles. Search on Bibsonomy ISNN (2) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
45Cristina Cifuentes, Antoine Fraboulet Intraprocedural Static Slicing of Binary Executables. Search on Bibsonomy ICSM The full citation details ... 1997 DBLP  DOI  BibTeX  RDF goto jumps, reverse engineering, binary code, disassembly, Static slicing
45Sashikanth Chandrasekaran, Mark D. Hill Optimistic Simulation of Parallel Architectures Using Program Executables. Search on Bibsonomy Workshop on Parallel and Distributed Simulation The full citation details ... 1996 DBLP  DOI  BibTeX  RDF Parallel Machines, Optimistic Simulation, State Saving, Direct Execution
41Eddy Deligne Hyperviseur de protection d'exécutables - Etude, développement et discussion. (Hypervisor for executables protection - design, development and discussion). Search on Bibsonomy 2014   RDF
40George M. Mohay, J. Zellers Kernel and Shell-Based Applications Integrity Assurance. Search on Bibsonomy ACSAC The full citation details ... 1997 DBLP  DOI  BibTeX  RDF kernel-based applications integrity assurance, shell-based applications integrity assurance, software authenticity verification, CASS project, Computer Architecture for Secure Systems, UNIX SVR4.2, Mach 3.0 microkernel, portable shell, UNIX-style platforms, security, data integrity, operating system, executables, computer viruses, integrity checking, implementation issues
36Marius Nita, David Notkin White-box approaches for improved testing and analysis of configurable software systems. Search on Bibsonomy ICSE Companion The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
36Yingxu Lai A Feature Selection for Malicious Detection. Search on Bibsonomy SNPD The full citation details ... 2008 DBLP  DOI  BibTeX  RDF unknown malicious detection, classification, SVM, feature selection
36Gogul Balakrishnan, Thomas W. Reps Recency-Abstraction for Heap-Allocated Storage. Search on Bibsonomy SAS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
36Samik Basu 0001, Prem Uppuluri Proxy-Annotated Control Flow Graphs: Deterministic Context-Sensitive Monitoring for Intrusion Detection. Search on Bibsonomy ICDCIT The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
36Jesse C. Rabek, Roger I. Khazan, Scott M. Lewandowski, Robert K. Cunningham Detection of injected, dynamically generated, and obfuscated malicious code. Search on Bibsonomy WORM The full citation details ... 2003 DBLP  DOI  BibTeX  RDF intrusion detection, static analysis, anomaly detection, dynamic analysis, system calls, code analysis, execution monitoring, malicious code detection
32Pranith D. Kumar, Anchal Nema, Rajeev Kumar Hybrid analysis of executables to detect security vulnerabilities: security vulnerabilities. Search on Bibsonomy ISEC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF hybrid analysis, instrumentation, slicing, security vulnerabilities, memory errors
32Boris Rozenberg, Ehud Gudes, Yuval Elovici, Yuval Fledel Method for Detecting Unknown Malicious Executables. Search on Bibsonomy RAID The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
32Andreas Sæbjørnsen, Jeremiah Willcock, Thomas Panas, Daniel J. Quinlan, Zhendong Su 0001 Detecting code clones in binary executables. Search on Bibsonomy ISSTA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF software tools, clone detection, binary analysis
32Fanchen Su, Zhiyi Yin, Haitao Yao, Jianming Fu, Fuxi Zhu Fingerprint Extraction of Executables Based on the Potential Field Graph of Callgraph. Search on Bibsonomy CSSE (3) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
32Jingbo Zhang, Rongcai Zhao, Jianmin Pang Parameter and Return-value Analysis of Binary Executables. Search on Bibsonomy COMPSAC (1) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
32Tao Wei, Jian Mao, Wei Zou, Yu Chen Structuring 2-way Branches in Binary Executables. Search on Bibsonomy COMPSAC (1) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
32Rathijit Sen, Y. N. Srikant WCET estimation for executables in the presence of data caches. Search on Bibsonomy EMSOFT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
32Gogul Balakrishnan, Thomas W. Reps DIVINE: DIscovering Variables IN Executables. Search on Bibsonomy VMCAI The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
32Junghee Lim, Thomas W. Reps, Ben Liblit Extracting Output Formats from Executables. Search on Bibsonomy WCRE The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
32Marco Cova, Viktoria Felmetsger, Greg Banks, Giovanni Vigna Static Detection of Vulnerabilities in x86 Executables. Search on Bibsonomy ACSAC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF binary static analysis, symbolic execution, Vulnerability analysis, taint analysis
32Noah Snavely, Saumya K. Debray, Gregory R. Andrews Unpredication, Unscheduling, Unspeculation: Reverse Engineering Itanium Executables. Search on Bibsonomy IEEE Trans. Software Eng. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF EPIC architectures, Reverse engineering, speculation, code optimization, predication
32Gogul Balakrishnan, Thomas W. Reps, Nicholas Kidd, Akash Lal, Junghee Lim, David Melski, Radu Gruian, Suan Hsi Yong, Chi-Hua Chen, Tim Teitelbaum Model Checking x86 Executables with CodeSurfer/x86 and WPDS++. Search on Bibsonomy CAV The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
32Gogul Balakrishnan, Thomas W. Reps Analyzing Memory Accesses in x86 Executables. Search on Bibsonomy CC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
32Noah Snavely, Saumya K. Debray, Gregory R. Andrews Unscheduling, Unpredication, Unspeculation: Reverse Engineering Itanium Executables. Search on Bibsonomy WCRE The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
32Ákos Kiss 0001, Judit Jász, Gábor Lehotai, Tibor Gyimóthy Interprocedural Static Slicing of Binary Executables. Search on Bibsonomy SCAM The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
32Peter Fritzson, Roland Wismüller, Olav Hansen, Jonas Sala, Peter Skov A Parallel Debugger with Support for Distributed Arrays, Multiple Executables and Dynamic Processes. Search on Bibsonomy CC The full citation details ... 1996 DBLP  DOI  BibTeX  RDF
27Jun-Hyung Park, Minsoo Kim 0002, Bong-Nam Noh A Visualization Technique for Installation Evidences Containing Malicious Executable Files Using Machine Language Sequence. Search on Bibsonomy WISA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Anti-Forensic, Machine language, Malicious executables, opcode visualization, Similarity, Malware, Digital Forensic
27Henrik Theiling Extracting safe and precise control flow from binaries. Search on Bibsonomy RTCSA The full citation details ... 2000 DBLP  DOI  BibTeX  RDF safe precise control flow extraction, binary executables, instruction sequence clustering, branch targets, block boundaries, safety-critical real-time systems, graph approximation, entry points, instruction blocks, instruction routines, real-time systems, uncertainties, sequences, safety-critical software, program diagnostics, control flow graph, program control structures, static program analysis, flow graphs, bottom-up approach
24Qijun Gu Efficient code diversification for network reprogramming in sensor networks. Search on Bibsonomy WISEC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF code diversity, code security, deluge, tinyos, network reprogramming
24Yanfang Ye 0001, Lifei Chen, Dingding Wang 0001, Tao Li 0001, Qingshan Jiang, Min Zhao SBMDS: an interpretable string based malware detection system using SVM ensemble with bagging. Search on Bibsonomy J. Comput. Virol. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
24Emilio Wuerges, Luiz C. V. dos Santos, Olinto J. V. Furtado, Sandro Rigo An early real-time checker for retargetable compile-time analysis. Search on Bibsonomy SBCCI The full citation details ... 2009 DBLP  DOI  BibTeX  RDF compile-time WCET analysis, time-constraint feasibility analysis
24M. Zubair Shafiq, S. Momina Tabish, Muddassar Farooq On the appropriateness of evolutionary rule learning algorithms for malware detection. Search on Bibsonomy GECCO (Companion) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF learning classifier systems, malware detection, genetics based machine learning
24M. Zubair Shafiq, S. Momina Tabish, Muddassar Farooq Are evolutionary rule learning algorithms appropriate for malware detection? Search on Bibsonomy GECCO The full citation details ... 2009 DBLP  DOI  BibTeX  RDF malware detection, genetics based machine learning
24Yanfang Ye 0001, Dingding Wang 0001, Tao Li 0001, Dongyi Ye, Qingshan Jiang An intelligent PE-malware detection system based on association mining. Search on Bibsonomy J. Comput. Virol. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
24Robert Moskovitch, Clint Feher, Nir Tzachar, Eugene Berger, Marina Gitelman, Shlomi Dolev, Yuval Elovici Unknown Malcode Detection Using OPCODE Representation. Search on Bibsonomy EuroISI The full citation details ... 2008 DBLP  DOI  BibTeX  RDF OpCode, Classification, Malicious Code Detection
24Daniel Bilar On callgraphs and generative mechanisms. Search on Bibsonomy J. Comput. Virol. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
24Daniel Bilar On callgraphs and generative mechanisms. Search on Bibsonomy J. Comput. Virol. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
24Tao Wei, Jian Mao, Wei Zou, Yu Chen A New Algorithm for Identifying Loops in Decompilation. Search on Bibsonomy SAS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Loop identifying, Unstructuredness coefficient, Control flow analysis, Decompilation
24Salvador Trujillo, Don S. Batory, Oscar Díaz Feature Oriented Model Driven Development: A Case Study for Portlets. Search on Bibsonomy ICSE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
24Krishna Sandeep Reddy Dubba, Arun K. Pujari N-gram analysis for computer virus detection. Search on Bibsonomy J. Comput. Virol. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
24Abdur Rakib, Oleg Parshin, Stephan Thesing, Reinhard Wilhelm Component-Wise Instruction-Cache Behavior Prediction. Search on Bibsonomy ATVA The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
24Cullen Linn, Saumya K. Debray Obfuscation of executable code to improve resistance to static disassembly. Search on Bibsonomy CCS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF disassembly, code obfuscation
24Amitabh Srivastava Emerging opportunities for binary tools. Search on Bibsonomy SIGARCH Comput. Archit. News The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
24Saumya K. Debray, William S. Evans, Robert Muth, Bjorn De Sutter Compiler techniques for code compaction. Search on Bibsonomy ACM Trans. Program. Lang. Syst. The full citation details ... 2000 DBLP  DOI  BibTeX  RDF code compression, code size reduction, code compaction
24Kiyoko F. Aoki, D. T. Lee A Web-Based Distributed Programming Environment. Search on Bibsonomy HPCN The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
24Claudia Eckert 0001, Markus Pizka Improving Resource Management in Distributed Systems using Language-Level Structuring Concepts. Search on Bibsonomy J. Supercomput. The full citation details ... 1999 DBLP  DOI  BibTeX  RDF distributed system, resource management, programming language
24Keith D. Cooper, Nathaniel McIntosh Enhanced Code Compression for Embedded RISC Processors. Search on Bibsonomy PLDI The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
20Syed Khurram Jah Rizvi, Muhammad Moazam Fraz Robust malware clustering of windows portable executables using ensemble latent representation and distribution modeling. Search on Bibsonomy Concurr. Comput. Pract. Exp. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
20Ryuto Omachi, Yasuyuki Murakami Packer Identification Method for Multi-Layer Executables Using Entropy Analysis with k-Nearest Neighbor Algorithm. Search on Bibsonomy IEICE Trans. Fundam. Electron. Commun. Comput. Sci. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
20Meet Udeshi, Prashanth Krishnamurthy, Hammond Pearce, Ramesh Karri, Farshad Khorrami REMaQE - Reverse Engineering Math Equations from Executables. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
20Yanzuo Chen, Zhibo Liu, Yuanyuan Yuan, Sihang Hu, Tianxiang Li, Shuai Wang Unveiling Single-Bit-Flip Attacks on DNN Executables. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
20Sai Bala Subrahmanyam Singam, Goutham Pooloth, Vasanth Kumar Reddy Ambati, C. V. Bijitha, Hiran V. Nath A hybrid method for analysis and detection of malicious executables in IoT network. Search on Bibsonomy Comput. Secur. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
20Ciprian Teodorov G∀min∃: Exploring the Boundary Between Executable Specification Languages and Behavior Analysis Tools. (G∀min∃ : Exploration de la frontière entre les langages de spécification exécutables et les outils d'analyse du comportement). Search on Bibsonomy 2023   RDF
20Ziyi Lin, Jinku Li, Bowen Li, Haoyu Ma, Debin Gao, Jianfeng Ma 0001 TypeSqueezer: When Static Recovery of Function Signatures for Binary Executables Meets Dynamic Analysis. Search on Bibsonomy CCS The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
20Zhibo Liu, Yuanyuan Yuan, Shuai Wang 0011, Xiaofei Xie, Lei Ma 0003 Decompiling x86 Deep Neural Network Executables. Search on Bibsonomy USENIX Security Symposium The full citation details ... 2023 DBLP  BibTeX  RDF
20Yanzuo Chen, Yuanyuan Yuan, Shuai Wang 0011 OBSan: An Out-Of-Bound Sanitizer to Harden DNN Executables. Search on Bibsonomy NDSS The full citation details ... 2023 DBLP  BibTeX  RDF
20Jian Gu, Harald C. Gall Towards Top-Down Automated Development in Limited Scopes: A Neuro-Symbolic Framework from Expressibles to Executables. Search on Bibsonomy ESEC/SIGSOFT FSE The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
20Dominik Töllner, Christian Dietrich 0001, Illia Ostapyshyn, Florian Rommel, Daniel Lohmann MELF: Multivariant Executables for a Heterogeneous World. Search on Bibsonomy USENIX Annual Technical Conference The full citation details ... 2023 DBLP  BibTeX  RDF
20Sanghoon Jeon 0004, Minsoo Ryu, Dongyoung Kim, Huy Kang Kim Automatically Seed Corpus and Fuzzing Executables Generation Using Test Framework. Search on Bibsonomy IEEE Access The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
20Vanessa V. Sochat, Matthieu Muffato, Audrey Stott, Marco De La Pierre, Georgia Stuart Automated Cache for Container Executables. Search on Bibsonomy CoRR The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
20Andreas Schaad, Dominik Binder Deep-Learning-based Vulnerability Detection in Binary Executables. Search on Bibsonomy CoRR The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
20Zhibo Liu, Yuanyuan Yuan, Shuai Wang 0011, Xiaofei Xie, Lei Ma 0003 Decompiling x86 Deep Neural Network Executables. Search on Bibsonomy CoRR The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
20Terence Kelly Literate Executables. Search on Bibsonomy ACM Queue The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
20Andreas Schaad, Dominik Binder Deep-Learning-Based Vulnerability Detection in Binary Executables. Search on Bibsonomy FPS The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
20Thomas Ryan Devine, Maximillian Campbell, Mallory Anderson, Dale Dzielski SREP+SAST: A Comparison of Tools for Reverse Engineering Machine Code to Detect Cybersecurity Vulnerabilities in Binary Executables. Search on Bibsonomy CSCI The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
20Nicolaas Weideman, Haoda Wang, Tyler Kann, Spencer Zahabizadeh, Wei-Cheng Wu, Rajat Tandon, Jelena Mirkovic, Christophe Hauser Harm-DoS: Hash Algorithm Replacement for Mitigating Denial-of-Service Vulnerabilities in Binary Executables. Search on Bibsonomy RAID The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
20Faezeh Khorram A testing framework for executable domain-specific languages. (Un environnement de test pour les langages dédiés exécutables). Search on Bibsonomy 2022   RDF
20Sami Ullah, Wenhui Jin, Heekuck Oh Efficient Features for Function Matching in Multi-Architecture Binary Executables. Search on Bibsonomy IEEE Access The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
20Anandharaju Durai Raju, Ke Wang 0001 Echelon: Two-Tier Malware Detection for Raw Executables to Reduce False Alarms. Search on Bibsonomy CoRR The full citation details ... 2021 DBLP  BibTeX  RDF
20Wei-Chieh Chao, Chung-Kuan Chen, Chen-Mou Cheng Cryfind: Using Static Analysis to Identify Cryptographic Algorithms in Binary Executables. Search on Bibsonomy DSC The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
20Behrad Garmany MENTALESE - an architecture-agnostic analysis framework for binary executables. Search on Bibsonomy 2021   RDF
20Karim Eldefrawy, Michael Locasto, Norrathep Rattanavipanon, Hassen Saïdi Towards Automated Augmentation and Instrumentation of Legacy Cryptographic Executables: Extended Version. Search on Bibsonomy CoRR The full citation details ... 2020 DBLP  BibTeX  RDF
20Navid Ordouie, Rasha Almajed, Ramesh K. Karne, Alexander L. Wijesinha, Joel Weymouth, Nirmala Soundararajan Transformation Methodology of Binary Executables to Run on Bare Machines. Search on Bibsonomy CATA The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
20Karim Eldefrawy, Michael Locasto, Norrathep Rattanavipanon, Hassen Saïdi Towards Automated Augmentation and Instrumentation of Legacy Cryptographic Executables. Search on Bibsonomy ACNS (2) The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
20Jiarun Dai, Yuan Zhang 0009, Zheyue Jiang, Yingtian Zhou, Junyan Chen, Xinyu Xing, Xiaohan Zhang 0001, Xin Tan, Min Yang 0002, Zhemin Yang BScout: Direct Whole Patch Presence Test for Java Executables. Search on Bibsonomy USENIX Security Symposium The full citation details ... 2020 DBLP  BibTeX  RDF
20Jedediah Haile, Sage Havens Identifying Ubiquitious Third-Party Libraries in Compiled Executables Using Annotated and Translated Disassembled Code with Supervised Machine Learning. Search on Bibsonomy SP (Workshops) The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
20Ryuto Omachi, Yasuyuki Murakami Packer Identification Method for Multi-layer Executables with k-Nearest Neighbor of Entropies. Search on Bibsonomy ISITA The full citation details ... 2020 DBLP  BibTeX  RDF
20Yaniv David Similarity in Binary Executables. Search on Bibsonomy 2020   RDF
20Zhuo Zhang 0002, Wei You, Guanhong Tao 0001, Guannan Wei 0001, Yonghwi Kwon 0001, Xiangyu Zhang 0001 BDA: practical dependence analysis for binary executables by unbiased whole-program path sampling and per-path abstract interpretation. Search on Bibsonomy Proc. ACM Program. Lang. The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
20Roee Leon, Michael Kiperberg, Anat Anatey Leon Zabag, Amit Resh, Asaf Algawi, Nezer J. Zaidenberg Hypervisor-Based White Listing of Executables. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
20Chariton Karamitas, Athanasios Kehagias Function matching between binary executables: efficient algorithms and features. Search on Bibsonomy J. Comput. Virol. Hacking Tech. The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
20Emre Güler, Cornelius Aschermann, Ali Abbasi 0002, Thorsten Holz AntiFuzz: Impeding Fuzzing Audits of Binary Executables. Search on Bibsonomy USENIX Security Symposium The full citation details ... 2019 DBLP  BibTeX  RDF
Displaying result #1 - #100 of 355 (100 per page; Change: )
Pages: [1][2][3][4][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license