The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for binaries with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1952-1998 (16) 1999-2001 (25) 2002 (17) 2003 (15) 2004 (23) 2005 (29) 2006 (22) 2007 (27) 2008 (38) 2009 (29) 2010 (15) 2011-2012 (21) 2013-2014 (28) 2015 (25) 2016 (18) 2017 (34) 2018 (30) 2019 (38) 2020 (26) 2021 (35) 2022 (30) 2023 (41) 2024 (7)
Publication types (Num. hits)
article(122) incollection(1) inproceedings(456) phdthesis(10)
Venues (Conferences, Journals, ...)
CoRR(40) ACSAC(18) USENIX Security Symposium(16) CGO(10) PLDI(9) ICSE(8) WCRE(8) ASE(7) CCS(7) ISSTA(7) NDSS(7) RAID(7) SP(7) VEE(7) DSN(6) IEEE Access(6) More (+10 of total 303)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 385 occurrences of 291 keywords

Results
Found 589 publication records. Showing 589 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
18Yaohui Chen, Dongli Zhang, Ruowen Wang, Rui Qiao, Ahmed M. Azab, Long Lu, Hayawardh Vijayakumar, Wenbo Shen NORAX: Enabling Execute-Only Memory for COTS Binaries on AArch64. Search on Bibsonomy IEEE Symposium on Security and Privacy The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
18Dongpeng Xu 0001, Jiang Ming 0002, Dinghao Wu Cryptographic Function Detection in Obfuscated Binaries via Bit-Precise Symbolic Loop Mapping. Search on Bibsonomy IEEE Symposium on Security and Privacy The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
18Zhengzi Xu, Bihuan Chen 0001, Mahinthan Chandramohan, Yang Liu 0003, Fu Song SPAIN: security patch analysis for binaries towards understanding the pain and pills. Search on Bibsonomy ICSE The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
18Mingwei Zhang 0005, Michalis Polychronakis, R. Sekar 0001 Protecting COTS Binaries from Disclosure-guided Code Reuse Attacks. Search on Bibsonomy ACSAC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
18Wenjian He, Sanjeev Das, Wei Zhang 0012, Yang Liu 0003 No-Jump-into-Basic-Block: Enforce Basic Block CFI on the Fly for Real-world Binaries. Search on Bibsonomy DAC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
18Ed Robbins 0001 Solvers for type recovery and decompilation of binaries. Search on Bibsonomy 2017   RDF
18Franck de Goër de Herve Reverse-engineering of binaries in a single execution : a lightweight function-grained dynamic analysis. (Rétro-ingénierie de programmes binaires en une exécution : une analyse dynamique légère basée au niveau des fonctions). Search on Bibsonomy 2017   RDF
18István Haller, Asia Slowinska, Herbert Bos Scalable data structure detection and classification for C/C++ binaries. Search on Bibsonomy Empir. Softw. Eng. The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
18Xi Chen 0038, Asia Slowinska, Herbert Bos On the detection of custom memory allocators in C binaries. Search on Bibsonomy Empir. Softw. Eng. The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
18Haoyu Ren, Ze-Nian Li Object detection using boosted local binaries. Search on Bibsonomy Pattern Recognit. The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
18Konstantin Böttinger Fuzzing binaries with Lévy flight swarms. Search on Bibsonomy EURASIP J. Inf. Secur. The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
18Dennis Gamayunov, Mikhail Voronov, Newton Lee Autonomous Vulnerability Scanning and Patching of Binaries. Search on Bibsonomy Google It, Total Information Awareness The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
18Joseph Caldwell Reducing procedure call bloat in ARM binaries. Search on Bibsonomy SPLASH (Companion Volume) The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
18Sawood Alam, Michael L. Nelson MemGator - A Portable Concurrent Memento Aggregator: Cross-Platform CLI and Server Binaries in Go. Search on Bibsonomy JCDL The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
18Byron Hawkins, Brian Demsky, Michael B. Taylor BlackBox: lightweight security monitoring for COTS binaries. Search on Bibsonomy CGO The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
18Bartlomiej Debski, Stanislaw Zola Starspot migration in close binaries: A fast parameters evaluation from large sky surveys. Search on Bibsonomy Astroinformatics The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
18Omer Katz, Ran El-Yaniv, Eran Yahav Estimating types in binaries using predictive modeling. Search on Bibsonomy POPL The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
18Shuai Wang 0011, Pei Wang 0007, Dinghao Wu UROBOROS: Instrumenting Stripped Binaries with Static Reassembling. Search on Bibsonomy SANER The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
18Dennis Andriesse, Xi Chen 0038, Victor van der Veen, Asia Slowinska, Herbert Bos An In-Depth Analysis of Disassembly on Full-Scale x86/x64 Binaries. Search on Bibsonomy USENIX Security Symposium The full citation details ... 2016 DBLP  BibTeX  RDF
18Yaniv David, Nimrod Partush, Eran Yahav Statistical similarity of binaries. Search on Bibsonomy PLDI The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
18Konstantin Böttinger, Claudia Eckert 0001 DeepFuzz: Triggering Vulnerabilities Deeply Hidden in Binaries - (Extended Abstract). Search on Bibsonomy DIMVA The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
18Van-Thuan Pham, Marcel Böhme, Abhik Roychoudhury Model-based whitebox fuzzing for program binaries. Search on Bibsonomy ASE The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
18Pawel Sarbinowski, Vasileios P. Kemerlis, Cristiano Giuffrida, Elias Athanasopoulos VTPin: practical VTable hijacking protection for binaries. Search on Bibsonomy ACSAC The full citation details ... 2016 DBLP  BibTeX  RDF
18David Korczynski RePEconstruct: reconstructing binaries with self-modifying code and import address table destruction. Search on Bibsonomy MALWARE The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
18Riyad Parvez, Paul A. S. Ward, Vijay Ganesh Combining static analysis and targeted symbolic execution for scalable bug-finding in application binaries. Search on Bibsonomy CASCON The full citation details ... 2016 DBLP  BibTeX  RDF
18Aylin Caliskan Islam, Fabian Yamaguchi, Edwin Dauber, Richard E. Harang, Konrad Rieck, Rachel Greenstadt, Arvind Narayanan When Coding Style Survives Compilation: De-anonymizing Programmers from Executable Binaries. Search on Bibsonomy CoRR The full citation details ... 2015 DBLP  BibTeX  RDF
18Ian D. Peake, Jan Olaf Blech, Lasith Fernando, Divyasheel Sharma, Srini Ramaswamy, Mallikarjun Kande Analysis of Software Binaries for Reengineering-Driven Product Line Architecture - An Industrial Case Study. Search on Bibsonomy FMSPLE The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
18Sasa Stojanovic, Zaharije Radivojevic, Milos Cvetanovic Approach for estimating similarity between procedures in differently compiled binaries. Search on Bibsonomy Inf. Softw. Technol. The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
18Ronald Prescott Loui, Dylan Dozier, Evan Barber, Jeswanth Harish Auralization of process and port status using program binaries to generate semantically meaningful non-fatiguing noise as canonical sound signals. Search on Bibsonomy EIT The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
18Guillaume Bonfante, José M. Fernandez 0001, Jean-Yves Marion, Benjamin Rouxel, Fabrice Sabatier, Aurélien Thierry CoDisasm: Medium Scale Concatic Disassembly of Self-Modifying Binaries with Overlapping Instructions. Search on Bibsonomy CCS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
18Shuvendu K. Lahiri, Rohit Sinha 0001, Chris Hawblitzel Automatic Rootcausing for Program Equivalence Failures in Binaries. Search on Bibsonomy CAV (1) The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
18Matthias Neugschwandtner, Paolo Milani Comparetti, István Haller, Herbert Bos The BORG: Nanoprobing Binaries for Buffer Overreads. Search on Bibsonomy CODASPY The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
18Anthony Brandon, Joost Hoozemans, Jeroen van Straten, Arthur Francisco Lorenzon, Anderson Luiz Sartor, Antonio Carlos Schneider Beck, Stephan Wong A sparse VLIW instruction encoding scheme compatible with generic binaries. Search on Bibsonomy ReConFig The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
18Sven Mattsen, Arne Wichmann 0001, Sibylle Schupp A non-convex abstract domain for the value analysis of binaries. Search on Bibsonomy SANER The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
18Eui Chul Richard Shin, Dawn Song, Reza Moazzezi Recognizing Functions in Binaries with Neural Networks. Search on Bibsonomy USENIX Security Symposium The full citation details ... 2015 DBLP  BibTeX  RDF
18Charles Yount, Harish Patil, Mohammad S. Islam, Aditya Srikanth Graph-matching-based simulation-region selection for multiple binaries. Search on Bibsonomy ISPASS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
18Xi Chen 0038, Asia Slowinska, Dennis Andriesse, Herbert Bos, Cristiano Giuffrida StackArmor: Comprehensive Protection From Stack-based Memory Error Vulnerabilities for Binaries. Search on Bibsonomy NDSS The full citation details ... 2015 DBLP  BibTeX  RDF
18Aravind Prakash, Xunchao Hu, Heng Yin 0001 vfGuard: Strict Protection for Virtual Function Calls in COTS C++ Binaries. Search on Bibsonomy NDSS The full citation details ... 2015 DBLP  BibTeX  RDF
18Charith Mendis, Jeffrey Bosboom, Kevin Wu, Shoaib Kamil 0001, Jonathan Ragan-Kelley, Sylvain Paris, Qin Zhao, Saman P. Amarasinghe Helium: lifting high-performance stencil kernels from stripped x86 binaries to halide DSL code. Search on Bibsonomy PLDI The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
18Mario Polino, Andrea Scorti, Federico Maggi, Stefano Zanero Jackdaw: Towards Automatic Reverse Engineering of Large Datasets of Binaries. Search on Bibsonomy DIMVA The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
18Yongzheng Wu, Roland H. C. Yap Simple and Practical Integrity Models for Binaries and Files. Search on Bibsonomy IFIPTM The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
18Yu Liang, Xinjie Ma, Daoyuan Wu, Xiaoxiao Tang, Debin Gao, Guojun Peng, Chunfu Jia, Huanguo Zhang Stack Layout Randomization with Minimal Rewriting of Android Binaries. Search on Bibsonomy ICISC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
18Denis Gopan, Evan Driscoll, Ducson Nguyen, Dimitri Naydich, Alexey Loginov, David Melski Data-Delineation in Software Binaries and its Application to Buffer-Overrun Discovery. Search on Bibsonomy ICSE (1) The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
18Van-Thuan Pham, Wei Boon Ng, Konstantin Rubinov, Abhik Roychoudhury Hercules: Reproducing Crashes in Real-World Application Binaries. Search on Bibsonomy ICSE (1) The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
18Mingwei Zhang 0005, R. Sekar 0001 Control Flow and Code Integrity for COTS binaries: An Effective Defense Against Real-World ROP Attacks. Search on Bibsonomy ACSAC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
18Franck de Goër, Roland Groz, Laurent Mounier Lightweight heuristics to retrieve parameter associations from binaries. Search on Bibsonomy PPREW@ACSAC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
18Ashutosh Jain, Hugo Gonzalez, Natalia Stakhanova Enriching reverse engineering through visual exploration of Android binaries. Search on Bibsonomy PPREW@ACSAC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
18Minghua Wang, Heng Yin 0001, Abhishek Vasisht Bhaskar, Purui Su, Dengguo Feng Binary Code Continent: Finer-Grained Control Flow Integrity for Stripped Binaries. Search on Bibsonomy ACSAC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
18Bogdan Copos, Praveen Murthy InputFinder: Reverse Engineering Closed Binaries using Hardware Performance Counters. Search on Bibsonomy PPREW@ACSAC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
18Eric Schkufza Stochastic program optimization for x86_64 binaries. Search on Bibsonomy 2015   RDF
18Ying-Dar Lin, Yi-Ta Chiang, Yu-Sung Wu, Yuan-Cheng Lai Automatic Analysis and Classification of Obfuscated Bot Binaries. Search on Bibsonomy Int. J. Netw. Secur. The full citation details ... 2014 DBLP  BibTeX  RDF
18Penelope Eckert The Problem with Binaries: Coding for Gender and Sexuality. Search on Bibsonomy Lang. Linguistics Compass The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
18Xin Yang 0008, Kwang-Ting Cheng Learning Optimized Local Difference Binaries for Scalable Augmented Reality on Mobile Devices. Search on Bibsonomy IEEE Trans. Vis. Comput. Graph. The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
18Tobias F. Pfeffer, Paula Herber, Jörg Schneider 0001 Reverse Engineering of ARM Binaries Using Formal Transformations. Search on Bibsonomy SIN The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
18Kyungjin Yoo, Rajeev Barua Recovery of Object Oriented Features from C++ Binaries. Search on Bibsonomy APSEC (1) The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
18Wesley Jin, Cory F. Cohen, Jeffrey Gennari, Charles Hines, Sagar Chaki, Arie Gurfinkel, Jeffrey Havrilla, Priya Narasimhan Recovering C++ Objects From Binaries Using Inter-Procedural Data-Flow Analysis. Search on Bibsonomy PPREW@POPL The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
18Gen Li 0002, Ying Zhang 0032, Shuangxi Wang, Kai Lu Online Taint Propagation Analysis with Precise Pointer-to Analysis for Detecting Bugs in Binaries. Search on Bibsonomy HPCC/CSS/ICESS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
18Sampsa Rauti, Samuel Laurén, Shohreh Hosseinzadeh, Jari-Matti Mäkelä, Sami Hyrynsalmi, Ville Leppänen Diversification of System Calls in Linux Binaries. Search on Bibsonomy INTRUST The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
18Aparna Kotha, Kapil Anand, Timothy Creech, Khaled Elwazeer, Matthew Smithson, Rajeev Barua Affine Parallelization of Loops with Run-Time Dependent Bounds from Binaries. Search on Bibsonomy ESOP The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
18Manuel Egele, Maverick Woo, Peter Chapman, David Brumley Blanket Execution: Dynamic Similarity Testing for Program Binaries and Components. Search on Bibsonomy USENIX Security Symposium The full citation details ... 2014 DBLP  BibTeX  RDF
18Samuel Laurén, Petteri Mäki, Sampsa Rauti, Shohreh Hosseinzadeh, Sami Hyrynsalmi, Ville Leppänen Symbol diversification of linux binaries. Search on Bibsonomy WorldCIS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
18Vasilis Pappas, Michalis Polychronakis, Angelos D. Keromytis Dynamic Reconstruction of Relocation Information for Stripped Binaries. Search on Bibsonomy RAID The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
18Haoyu Ren, Ze-Nian Li Boosted local binaries for object detection. Search on Bibsonomy ICME The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
18Michael Weiß, Steffen Wagner, Roland Hellman, Sascha Wessel Integrity Verification and Secure Loading of Remote Binaries for Microkernel-Based Runtime Environments. Search on Bibsonomy TrustCom The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
18Dohyeong Kim, William N. Sumner, Xiangyu Zhang 0001, Dongyan Xu, Hira Agrawal Reuse-oriented reverse engineering of functional components from x86 binaries. Search on Bibsonomy ICSE The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
18Mordechai Guri, Gabi Kedma, Assaf Kachlon, Yuval Elovici Resilience of Anti-malware Programs to Naïve Modifications of Malicious Binaries. Search on Bibsonomy JISIC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
18Gen Li 0002, Shuangxi Wang, Ying Zhang 0032, Xiaohui Peng 0004 Hunter: Online Accurate Taint Propagation Analysis Based System for Detecting Bugs in Binaries. Search on Bibsonomy DASC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
18Bhushan Jain, Chia-che Tsai, Jitin John, Donald E. Porter Practical techniques to obviate setuid-to-root binaries. Search on Bibsonomy EuroSys The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
18Ki-Jin Eom, Choong-Hyun Choi, Joon-Young Paik, Eun-Sun Cho An Efficient Static Taint-Analysis Detecting Exploitable-Points on ARM Binaries. Search on Bibsonomy SRDS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
18Anthony Brandon, Stephan Wong Support for dynamic issue width in VLIW processors using generic binaries. Search on Bibsonomy DATE The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
18István Haller, Asia Slowinska, Herbert Bos MemPick: High-level data structure detection in C/C++ binaries. Search on Bibsonomy WCRE The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
18Xi Chen 0038, Asia Slowinska, Herbert Bos MemBrush: A practical tool to detect custom memory allocators in C binaries. Search on Bibsonomy WCRE The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
18Xi Chen 0038, Asia Slowinska, Herbert Bos Who allocated my memory? Detecting custom memory allocators in C binaries. Search on Bibsonomy WCRE The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
18Mingwei Zhang 0005, R. Sekar 0001 Control Flow Integrity for COTS Binaries. Search on Bibsonomy USENIX Security Symposium The full citation details ... 2013 DBLP  BibTeX  RDF
18Jiunn-Yeu Chen, Bor-Yeh Shen, Quan-Huei Ou, Wuu Yang, Wei-Chung Hsu Effective code discovery for ARM/Thumb mixed ISA binaries in a static binary translator. Search on Bibsonomy CASES The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
18Bernard Blackham, Gernot Heiser Sequoll: A framework for model checking binaries. Search on Bibsonomy IEEE Real-Time and Embedded Technology and Applications Symposium The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
18Karolina Sarnowska-Upton, Andrew S. Grimshaw Predicting Execution Readiness of MPI Binaries with FEAM, a Framework for Efficient Application Migration. Search on Bibsonomy ICPP The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
18Khaled Yakdan, Sebastian Eschweiler, Elmar Gerhards-Padilla REcompile: A decompilation framework for static analysis of binaries. Search on Bibsonomy MALWARE The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
18Soon-Seok Kim, Deok-Gyu Lee, Jong Hyuk Park Efficient scheme of verifying integrity of application binaries in embedded operating systems. Search on Bibsonomy J. Supercomput. The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
18Sebastian Eschweiler, Elmar Gerhards-Padilla Platform-Independent Recognition of Procedures in Binaries Based on Simple Characteristics. Search on Bibsonomy it Inf. Technol. The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
18Benedikt Driessen, Christof Paar Solving Binary Linear Equation Systems over the Rationals and Binaries. Search on Bibsonomy WAIFI The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
18Michael Kling, Sasa Misailovic, Michael Carbin, Martin C. Rinard Bolt: on-demand infinite loop escape in unmodified binaries. Search on Bibsonomy OOPSLA The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
18Johannes Kinder Towards Static Analysis of Virtualization-Obfuscated Binaries. Search on Bibsonomy WCRE The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
18Vishwath Mohan, Kevin W. Hamlen Frankenstein: Stitching Malware from Benign Binaries. Search on Bibsonomy WOOT The full citation details ... 2012 DBLP  BibTeX  RDF
18Yuichiro Takeuchi Synthetic space: inhabiting binaries. Search on Bibsonomy CHI Extended Abstracts The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
18Edd Barrett, Andy King Range Analysis of Binaries with Minimal Effort. Search on Bibsonomy FMICS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
18Asia Slowinska, Traian Stancescu, Herbert Bos Body Armor for Binaries: Preventing Buffer Overflows Without Recompilation. Search on Bibsonomy USENIX Annual Technical Conference The full citation details ... 2012 DBLP  BibTeX  RDF
18Ulf Kargén, Nahid Shahmehri InputTracer: A Data-Flow Analysis Tool for Manual Program Comprehension of x86 Binaries. Search on Bibsonomy SCAM The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
18Richard Wartell, Yan Zhou 0001, Kevin W. Hamlen, Murat Kantarcioglu, Bhavani Thuraisingham Differentiating Code from Data in x86 Binaries. Search on Bibsonomy ECML/PKDD (3) The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
18Vitaly Chipounov, George Candea Enabling sophisticated analyses of ×86 binaries with RevGen. Search on Bibsonomy DSN Workshops The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
18Emily R. Jacobson, Nathan E. Rosenblum, Barton P. Miller Labeling library functions in stripped binaries. Search on Bibsonomy PASTE The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
18Michael D. Wilder, Robert Rinker Synthesizing Concurrent Synchronous Computing Machines from Interrupt-Driven Binaries. Search on Bibsonomy DSD The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
18Alexander Sepp, Bogdan Mihaila, Axel Simon Precise Static Analysis of Binaries by Extracting Relational Information. Search on Bibsonomy WCRE The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
18Sagar Chaki, Cory F. Cohen, Arie Gurfinkel Supervised learning for provenance-similarity of binaries. Search on Bibsonomy KDD The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
18Daniel P. Volpato, Alexandre Keunecke Ignácio Mendonça, José Luís Almada Güntzel, Luiz Cláudio Villar dos Santos Cache-tuning-aware scratchpad allocation from binaries. Search on Bibsonomy SBCCI The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
18Santosh Sonawane, Tzi-cker Chiueh Optimization of an Instrumentation Tool for Stripped Win32/X86 Binaries. Search on Bibsonomy ICPADS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
18Raghavendra Rajkumar, Andrew Wang 0002, Jason Hiser, Anh Nguyen-Tuong, Jack W. Davidson, John C. Knight Component-Oriented Monitoring of Binaries for Security. Search on Bibsonomy HICSS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
18Nathan E. Rosenblum, Xiaojin Zhu 0001, Barton P. Miller Who Wrote This Code? Identifying the Authors of Program Binaries. Search on Bibsonomy ESORICS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
18Kevin Coogan Deobfuscation of Packed and Virtualization-Obfuscation Protected Binaries. Search on Bibsonomy 2011   RDF
18Eric Filiol Malicious cryptography techniques for unreversable (malicious or not) binaries Search on Bibsonomy CoRR The full citation details ... 2010 DBLP  BibTeX  RDF
Displaying result #301 - #400 of 589 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license