|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 258 occurrences of 202 keywords
|
|
|
Results
Found 355 publication records. Showing 355 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
96 | M. Zubair Shafiq, S. Momina Tabish, Fauzan Mirza, Muddassar Farooq |
PE-Miner: Mining Structural Information to Detect Malicious Executables in Realtime. |
RAID |
2009 |
DBLP DOI BibTeX RDF |
Malicious Executable Detection, Portable Executables, Data Mining, Malware Detection, Structural Information |
81 | Mohammad M. Masud 0001, Latifur Khan, Bhavani Thuraisingham |
A scalable multi-level feature extraction technique to detect malicious executables. |
Inf. Syst. Frontiers |
2008 |
DBLP DOI BibTeX RDF |
Malicious executable, n-gram analysis, Feature extraction, Disassembly |
81 | Matthew G. Schultz, Eleazar Eskin, Erez Zadok, Salvatore J. Stolfo |
Data Mining Methods for Detection of New Malicious Executables. |
S&P |
2001 |
DBLP DOI BibTeX RDF |
|
69 | Jyh-Herng Chow, Yong-Fong Lee, Kalyan Muthukumar, Vivek Sarkar, Mauricio J. Serrano, Iris Garcia, John Hsu, Shauchi Ong, Honesty C. Young |
Optimized code restructuring of OS/2 executables. |
CASCON |
1995 |
DBLP BibTeX RDF |
|
60 | Bertrand Anckaert, Bjorn De Sutter, Dominique Chanet, Koen De Bosschere |
Steganography for Executables and Code Transformation Signatures. |
ICISC |
2004 |
DBLP DOI BibTeX RDF |
code transformation signature, steganography, executables |
57 | Yongtao Hu, Liang Chen, Ming Xu 0001, Ning Zheng 0001, Yanhua Guo |
Unknown Malicious Executables Detection Based on Run-Time Behavior. |
FSKD (4) |
2008 |
DBLP DOI BibTeX RDF |
|
57 | Jeremy Z. Kolter, Marcus A. Maloof |
Learning to detect malicious executables in the wild. |
KDD |
2004 |
DBLP DOI BibTeX RDF |
security, data mining, concept learning, malicious software |
48 | Andreas Stamminger, Christopher Kruegel, Giovanni Vigna, Engin Kirda |
Automated Spyware Collection and Analysis. |
ISC |
2009 |
DBLP DOI BibTeX RDF |
|
48 | Yingxu Lai, Zenghui Liu |
Unknown Malicious Identification. |
World Congress on Engineering (Selected Papers) |
2008 |
DBLP DOI BibTeX RDF |
Unknown malicious detection, Half Increment Naive Bayes, classification |
48 | Roch H. Glitho, Bertrand E. Lenou, Samuel Pierre |
Handling Subscription in a Mobile Agent-Based Service Environment for Internet Telephony: Swapping Agents. |
MATA |
2000 |
DBLP DOI BibTeX RDF |
|
48 | Ákos Kiss 0001, Judit Jász, Tibor Gyimóthy |
Using Dynamic Information in the Interprocedural Static Slicing of Binary Executables. |
Softw. Qual. J. |
2005 |
DBLP DOI BibTeX RDF |
interprocedural slicing, binary executables, indirect function call, call graph, dynamic information, static slicing |
45 | Wen Fu, Rongcai Zhao, Jianmin Pang, Jingbo Zhang |
Recovering Variable-Argument Functions from Binary Executables. |
ACIS-ICIS |
2008 |
DBLP DOI BibTeX RDF |
variable-argument function, reverse compilation, calling convention, instruction pattern, IA-64 |
45 | Gogul Balakrishnan, Thomas W. Reps |
Analyzing Stripped Device-Driver Executables. |
TACAS |
2008 |
DBLP DOI BibTeX RDF |
|
45 | Jingbo Zhang, Wen Fu, Jianmin Pang, Rongcai Zhao |
Using Propositional Calculas to Accurately Structure Control-Flow from Binary Executables. |
CSSE (2) |
2008 |
DBLP DOI BibTeX RDF |
|
45 | Roberto Perdisci, Andrea Lanzi, Wenke Lee |
McBoost: Boosting Scalability in Malware Collection and Analysis Using Statistical Classification of Executables. |
ACSAC |
2008 |
DBLP DOI BibTeX RDF |
|
45 | Seokwoo Choi, Heewan Park, Hyun-il Lim, Taisook Han |
A Static Birthmark of Binary Executables Based on API Call Structure. |
ASIAN |
2007 |
DBLP DOI BibTeX RDF |
software piracy, binary analysis, software birthmark |
45 | Danny Nebenzahl, Shmuel Sagiv, Avishai Wool |
Install-Time Vaccination of Windows Executables to Defend against Stack Smashing Attacks. |
IEEE Trans. Dependable Secur. Comput. |
2006 |
DBLP DOI BibTeX RDF |
Computer security, instrumentation, buffer overflow |
45 | Gogul Balakrishnan, Radu Gruian, Thomas W. Reps, Tim Teitelbaum |
CodeSurfer/x86-A Platform for Analyzing x86 Executables. |
CC |
2005 |
DBLP DOI BibTeX RDF |
|
45 | Zhenhe Guo, Zhengkai Liu, Ying Tan 0002 |
An NN-Based Malicious Executables Detection Algorithm Based on Immune Principles. |
ISNN (2) |
2004 |
DBLP DOI BibTeX RDF |
|
45 | Cristina Cifuentes, Antoine Fraboulet |
Intraprocedural Static Slicing of Binary Executables. |
ICSM |
1997 |
DBLP DOI BibTeX RDF |
goto jumps, reverse engineering, binary code, disassembly, Static slicing |
45 | Sashikanth Chandrasekaran, Mark D. Hill |
Optimistic Simulation of Parallel Architectures Using Program Executables. |
Workshop on Parallel and Distributed Simulation |
1996 |
DBLP DOI BibTeX RDF |
Parallel Machines, Optimistic Simulation, State Saving, Direct Execution |
41 | Eddy Deligne |
Hyperviseur de protection d'exécutables - Etude, développement et discussion. (Hypervisor for executables protection - design, development and discussion). |
|
2014 |
RDF |
|
40 | George M. Mohay, J. Zellers |
Kernel and Shell-Based Applications Integrity Assurance. |
ACSAC |
1997 |
DBLP DOI BibTeX RDF |
kernel-based applications integrity assurance, shell-based applications integrity assurance, software authenticity verification, CASS project, Computer Architecture for Secure Systems, UNIX SVR4.2, Mach 3.0 microkernel, portable shell, UNIX-style platforms, security, data integrity, operating system, executables, computer viruses, integrity checking, implementation issues |
36 | Marius Nita, David Notkin |
White-box approaches for improved testing and analysis of configurable software systems. |
ICSE Companion |
2009 |
DBLP DOI BibTeX RDF |
|
36 | Yingxu Lai |
A Feature Selection for Malicious Detection. |
SNPD |
2008 |
DBLP DOI BibTeX RDF |
unknown malicious detection, classification, SVM, feature selection |
36 | Gogul Balakrishnan, Thomas W. Reps |
Recency-Abstraction for Heap-Allocated Storage. |
SAS |
2006 |
DBLP DOI BibTeX RDF |
|
36 | Samik Basu 0001, Prem Uppuluri |
Proxy-Annotated Control Flow Graphs: Deterministic Context-Sensitive Monitoring for Intrusion Detection. |
ICDCIT |
2004 |
DBLP DOI BibTeX RDF |
|
36 | Jesse C. Rabek, Roger I. Khazan, Scott M. Lewandowski, Robert K. Cunningham |
Detection of injected, dynamically generated, and obfuscated malicious code. |
WORM |
2003 |
DBLP DOI BibTeX RDF |
intrusion detection, static analysis, anomaly detection, dynamic analysis, system calls, code analysis, execution monitoring, malicious code detection |
32 | Pranith D. Kumar, Anchal Nema, Rajeev Kumar |
Hybrid analysis of executables to detect security vulnerabilities: security vulnerabilities. |
ISEC |
2009 |
DBLP DOI BibTeX RDF |
hybrid analysis, instrumentation, slicing, security vulnerabilities, memory errors |
32 | Boris Rozenberg, Ehud Gudes, Yuval Elovici, Yuval Fledel |
Method for Detecting Unknown Malicious Executables. |
RAID |
2009 |
DBLP DOI BibTeX RDF |
|
32 | Andreas Sæbjørnsen, Jeremiah Willcock, Thomas Panas, Daniel J. Quinlan, Zhendong Su 0001 |
Detecting code clones in binary executables. |
ISSTA |
2009 |
DBLP DOI BibTeX RDF |
software tools, clone detection, binary analysis |
32 | Fanchen Su, Zhiyi Yin, Haitao Yao, Jianming Fu, Fuxi Zhu |
Fingerprint Extraction of Executables Based on the Potential Field Graph of Callgraph. |
CSSE (3) |
2008 |
DBLP DOI BibTeX RDF |
|
32 | Jingbo Zhang, Rongcai Zhao, Jianmin Pang |
Parameter and Return-value Analysis of Binary Executables. |
COMPSAC (1) |
2007 |
DBLP DOI BibTeX RDF |
|
32 | Tao Wei, Jian Mao, Wei Zou, Yu Chen |
Structuring 2-way Branches in Binary Executables. |
COMPSAC (1) |
2007 |
DBLP DOI BibTeX RDF |
|
32 | Rathijit Sen, Y. N. Srikant |
WCET estimation for executables in the presence of data caches. |
EMSOFT |
2007 |
DBLP DOI BibTeX RDF |
|
32 | Gogul Balakrishnan, Thomas W. Reps |
DIVINE: DIscovering Variables IN Executables. |
VMCAI |
2007 |
DBLP DOI BibTeX RDF |
|
32 | Junghee Lim, Thomas W. Reps, Ben Liblit |
Extracting Output Formats from Executables. |
WCRE |
2006 |
DBLP DOI BibTeX RDF |
|
32 | Marco Cova, Viktoria Felmetsger, Greg Banks, Giovanni Vigna |
Static Detection of Vulnerabilities in x86 Executables. |
ACSAC |
2006 |
DBLP DOI BibTeX RDF |
binary static analysis, symbolic execution, Vulnerability analysis, taint analysis |
32 | Noah Snavely, Saumya K. Debray, Gregory R. Andrews |
Unpredication, Unscheduling, Unspeculation: Reverse Engineering Itanium Executables. |
IEEE Trans. Software Eng. |
2005 |
DBLP DOI BibTeX RDF |
EPIC architectures, Reverse engineering, speculation, code optimization, predication |
32 | Gogul Balakrishnan, Thomas W. Reps, Nicholas Kidd, Akash Lal, Junghee Lim, David Melski, Radu Gruian, Suan Hsi Yong, Chi-Hua Chen, Tim Teitelbaum |
Model Checking x86 Executables with CodeSurfer/x86 and WPDS++. |
CAV |
2005 |
DBLP DOI BibTeX RDF |
|
32 | Gogul Balakrishnan, Thomas W. Reps |
Analyzing Memory Accesses in x86 Executables. |
CC |
2004 |
DBLP DOI BibTeX RDF |
|
32 | Noah Snavely, Saumya K. Debray, Gregory R. Andrews |
Unscheduling, Unpredication, Unspeculation: Reverse Engineering Itanium Executables. |
WCRE |
2003 |
DBLP DOI BibTeX RDF |
|
32 | Ákos Kiss 0001, Judit Jász, Gábor Lehotai, Tibor Gyimóthy |
Interprocedural Static Slicing of Binary Executables. |
SCAM |
2003 |
DBLP DOI BibTeX RDF |
|
32 | Peter Fritzson, Roland Wismüller, Olav Hansen, Jonas Sala, Peter Skov |
A Parallel Debugger with Support for Distributed Arrays, Multiple Executables and Dynamic Processes. |
CC |
1996 |
DBLP DOI BibTeX RDF |
|
27 | Jun-Hyung Park, Minsoo Kim 0002, Bong-Nam Noh |
A Visualization Technique for Installation Evidences Containing Malicious Executable Files Using Machine Language Sequence. |
WISA |
2008 |
DBLP DOI BibTeX RDF |
Anti-Forensic, Machine language, Malicious executables, opcode visualization, Similarity, Malware, Digital Forensic |
27 | Henrik Theiling |
Extracting safe and precise control flow from binaries. |
RTCSA |
2000 |
DBLP DOI BibTeX RDF |
safe precise control flow extraction, binary executables, instruction sequence clustering, branch targets, block boundaries, safety-critical real-time systems, graph approximation, entry points, instruction blocks, instruction routines, real-time systems, uncertainties, sequences, safety-critical software, program diagnostics, control flow graph, program control structures, static program analysis, flow graphs, bottom-up approach |
24 | Qijun Gu |
Efficient code diversification for network reprogramming in sensor networks. |
WISEC |
2010 |
DBLP DOI BibTeX RDF |
code diversity, code security, deluge, tinyos, network reprogramming |
24 | Yanfang Ye 0001, Lifei Chen, Dingding Wang 0001, Tao Li 0001, Qingshan Jiang, Min Zhao |
SBMDS: an interpretable string based malware detection system using SVM ensemble with bagging. |
J. Comput. Virol. |
2009 |
DBLP DOI BibTeX RDF |
|
24 | Emilio Wuerges, Luiz C. V. dos Santos, Olinto J. V. Furtado, Sandro Rigo |
An early real-time checker for retargetable compile-time analysis. |
SBCCI |
2009 |
DBLP DOI BibTeX RDF |
compile-time WCET analysis, time-constraint feasibility analysis |
24 | M. Zubair Shafiq, S. Momina Tabish, Muddassar Farooq |
On the appropriateness of evolutionary rule learning algorithms for malware detection. |
GECCO (Companion) |
2009 |
DBLP DOI BibTeX RDF |
learning classifier systems, malware detection, genetics based machine learning |
24 | M. Zubair Shafiq, S. Momina Tabish, Muddassar Farooq |
Are evolutionary rule learning algorithms appropriate for malware detection? |
GECCO |
2009 |
DBLP DOI BibTeX RDF |
malware detection, genetics based machine learning |
24 | Yanfang Ye 0001, Dingding Wang 0001, Tao Li 0001, Dongyi Ye, Qingshan Jiang |
An intelligent PE-malware detection system based on association mining. |
J. Comput. Virol. |
2008 |
DBLP DOI BibTeX RDF |
|
24 | Robert Moskovitch, Clint Feher, Nir Tzachar, Eugene Berger, Marina Gitelman, Shlomi Dolev, Yuval Elovici |
Unknown Malcode Detection Using OPCODE Representation. |
EuroISI |
2008 |
DBLP DOI BibTeX RDF |
OpCode, Classification, Malicious Code Detection |
24 | Daniel Bilar |
On callgraphs and generative mechanisms. |
J. Comput. Virol. |
2007 |
DBLP DOI BibTeX RDF |
|
24 | Daniel Bilar |
On callgraphs and generative mechanisms. |
J. Comput. Virol. |
2007 |
DBLP DOI BibTeX RDF |
|
24 | Tao Wei, Jian Mao, Wei Zou, Yu Chen |
A New Algorithm for Identifying Loops in Decompilation. |
SAS |
2007 |
DBLP DOI BibTeX RDF |
Loop identifying, Unstructuredness coefficient, Control flow analysis, Decompilation |
24 | Salvador Trujillo, Don S. Batory, Oscar Díaz |
Feature Oriented Model Driven Development: A Case Study for Portlets. |
ICSE |
2007 |
DBLP DOI BibTeX RDF |
|
24 | Krishna Sandeep Reddy Dubba, Arun K. Pujari |
N-gram analysis for computer virus detection. |
J. Comput. Virol. |
2006 |
DBLP DOI BibTeX RDF |
|
24 | Abdur Rakib, Oleg Parshin, Stephan Thesing, Reinhard Wilhelm |
Component-Wise Instruction-Cache Behavior Prediction. |
ATVA |
2004 |
DBLP DOI BibTeX RDF |
|
24 | Cullen Linn, Saumya K. Debray |
Obfuscation of executable code to improve resistance to static disassembly. |
CCS |
2003 |
DBLP DOI BibTeX RDF |
disassembly, code obfuscation |
24 | Amitabh Srivastava |
Emerging opportunities for binary tools. |
SIGARCH Comput. Archit. News |
2001 |
DBLP DOI BibTeX RDF |
|
24 | Saumya K. Debray, William S. Evans, Robert Muth, Bjorn De Sutter |
Compiler techniques for code compaction. |
ACM Trans. Program. Lang. Syst. |
2000 |
DBLP DOI BibTeX RDF |
code compression, code size reduction, code compaction |
24 | Kiyoko F. Aoki, D. T. Lee |
A Web-Based Distributed Programming Environment. |
HPCN |
2000 |
DBLP DOI BibTeX RDF |
|
24 | Claudia Eckert 0001, Markus Pizka |
Improving Resource Management in Distributed Systems using Language-Level Structuring Concepts. |
J. Supercomput. |
1999 |
DBLP DOI BibTeX RDF |
distributed system, resource management, programming language |
24 | Keith D. Cooper, Nathaniel McIntosh |
Enhanced Code Compression for Embedded RISC Processors. |
PLDI |
1999 |
DBLP DOI BibTeX RDF |
|
20 | Syed Khurram Jah Rizvi, Muhammad Moazam Fraz |
Robust malware clustering of windows portable executables using ensemble latent representation and distribution modeling. |
Concurr. Comput. Pract. Exp. |
2023 |
DBLP DOI BibTeX RDF |
|
20 | Ryuto Omachi, Yasuyuki Murakami |
Packer Identification Method for Multi-Layer Executables Using Entropy Analysis with k-Nearest Neighbor Algorithm. |
IEICE Trans. Fundam. Electron. Commun. Comput. Sci. |
2023 |
DBLP DOI BibTeX RDF |
|
20 | Meet Udeshi, Prashanth Krishnamurthy, Hammond Pearce, Ramesh Karri, Farshad Khorrami |
REMaQE - Reverse Engineering Math Equations from Executables. |
CoRR |
2023 |
DBLP DOI BibTeX RDF |
|
20 | Yanzuo Chen, Zhibo Liu, Yuanyuan Yuan, Sihang Hu, Tianxiang Li, Shuai Wang |
Unveiling Single-Bit-Flip Attacks on DNN Executables. |
CoRR |
2023 |
DBLP DOI BibTeX RDF |
|
20 | Sai Bala Subrahmanyam Singam, Goutham Pooloth, Vasanth Kumar Reddy Ambati, C. V. Bijitha, Hiran V. Nath |
A hybrid method for analysis and detection of malicious executables in IoT network. |
Comput. Secur. |
2023 |
DBLP DOI BibTeX RDF |
|
20 | Ciprian Teodorov |
G∀min∃: Exploring the Boundary Between Executable Specification Languages and Behavior Analysis Tools. (G∀min∃ : Exploration de la frontière entre les langages de spécification exécutables et les outils d'analyse du comportement). |
|
2023 |
RDF |
|
20 | Ziyi Lin, Jinku Li, Bowen Li, Haoyu Ma, Debin Gao, Jianfeng Ma 0001 |
TypeSqueezer: When Static Recovery of Function Signatures for Binary Executables Meets Dynamic Analysis. |
CCS |
2023 |
DBLP DOI BibTeX RDF |
|
20 | Zhibo Liu, Yuanyuan Yuan, Shuai Wang 0011, Xiaofei Xie, Lei Ma 0003 |
Decompiling x86 Deep Neural Network Executables. |
USENIX Security Symposium |
2023 |
DBLP BibTeX RDF |
|
20 | Yanzuo Chen, Yuanyuan Yuan, Shuai Wang 0011 |
OBSan: An Out-Of-Bound Sanitizer to Harden DNN Executables. |
NDSS |
2023 |
DBLP BibTeX RDF |
|
20 | Jian Gu, Harald C. Gall |
Towards Top-Down Automated Development in Limited Scopes: A Neuro-Symbolic Framework from Expressibles to Executables. |
ESEC/SIGSOFT FSE |
2023 |
DBLP DOI BibTeX RDF |
|
20 | Dominik Töllner, Christian Dietrich 0001, Illia Ostapyshyn, Florian Rommel, Daniel Lohmann |
MELF: Multivariant Executables for a Heterogeneous World. |
USENIX Annual Technical Conference |
2023 |
DBLP BibTeX RDF |
|
20 | Sanghoon Jeon 0004, Minsoo Ryu, Dongyoung Kim, Huy Kang Kim |
Automatically Seed Corpus and Fuzzing Executables Generation Using Test Framework. |
IEEE Access |
2022 |
DBLP DOI BibTeX RDF |
|
20 | Vanessa V. Sochat, Matthieu Muffato, Audrey Stott, Marco De La Pierre, Georgia Stuart |
Automated Cache for Container Executables. |
CoRR |
2022 |
DBLP DOI BibTeX RDF |
|
20 | Andreas Schaad, Dominik Binder |
Deep-Learning-based Vulnerability Detection in Binary Executables. |
CoRR |
2022 |
DBLP DOI BibTeX RDF |
|
20 | Zhibo Liu, Yuanyuan Yuan, Shuai Wang 0011, Xiaofei Xie, Lei Ma 0003 |
Decompiling x86 Deep Neural Network Executables. |
CoRR |
2022 |
DBLP DOI BibTeX RDF |
|
20 | Terence Kelly |
Literate Executables. |
ACM Queue |
2022 |
DBLP DOI BibTeX RDF |
|
20 | Andreas Schaad, Dominik Binder |
Deep-Learning-Based Vulnerability Detection in Binary Executables. |
FPS |
2022 |
DBLP DOI BibTeX RDF |
|
20 | Thomas Ryan Devine, Maximillian Campbell, Mallory Anderson, Dale Dzielski |
SREP+SAST: A Comparison of Tools for Reverse Engineering Machine Code to Detect Cybersecurity Vulnerabilities in Binary Executables. |
CSCI |
2022 |
DBLP DOI BibTeX RDF |
|
20 | Nicolaas Weideman, Haoda Wang, Tyler Kann, Spencer Zahabizadeh, Wei-Cheng Wu, Rajat Tandon, Jelena Mirkovic, Christophe Hauser |
Harm-DoS: Hash Algorithm Replacement for Mitigating Denial-of-Service Vulnerabilities in Binary Executables. |
RAID |
2022 |
DBLP DOI BibTeX RDF |
|
20 | Faezeh Khorram |
A testing framework for executable domain-specific languages. (Un environnement de test pour les langages dédiés exécutables). |
|
2022 |
RDF |
|
20 | Sami Ullah, Wenhui Jin, Heekuck Oh |
Efficient Features for Function Matching in Multi-Architecture Binary Executables. |
IEEE Access |
2021 |
DBLP DOI BibTeX RDF |
|
20 | Anandharaju Durai Raju, Ke Wang 0001 |
Echelon: Two-Tier Malware Detection for Raw Executables to Reduce False Alarms. |
CoRR |
2021 |
DBLP BibTeX RDF |
|
20 | Wei-Chieh Chao, Chung-Kuan Chen, Chen-Mou Cheng |
Cryfind: Using Static Analysis to Identify Cryptographic Algorithms in Binary Executables. |
DSC |
2021 |
DBLP DOI BibTeX RDF |
|
20 | Behrad Garmany |
MENTALESE - an architecture-agnostic analysis framework for binary executables. |
|
2021 |
RDF |
|
20 | Karim Eldefrawy, Michael Locasto, Norrathep Rattanavipanon, Hassen Saïdi |
Towards Automated Augmentation and Instrumentation of Legacy Cryptographic Executables: Extended Version. |
CoRR |
2020 |
DBLP BibTeX RDF |
|
20 | Navid Ordouie, Rasha Almajed, Ramesh K. Karne, Alexander L. Wijesinha, Joel Weymouth, Nirmala Soundararajan |
Transformation Methodology of Binary Executables to Run on Bare Machines. |
CATA |
2020 |
DBLP DOI BibTeX RDF |
|
20 | Karim Eldefrawy, Michael Locasto, Norrathep Rattanavipanon, Hassen Saïdi |
Towards Automated Augmentation and Instrumentation of Legacy Cryptographic Executables. |
ACNS (2) |
2020 |
DBLP DOI BibTeX RDF |
|
20 | Jiarun Dai, Yuan Zhang 0009, Zheyue Jiang, Yingtian Zhou, Junyan Chen, Xinyu Xing, Xiaohan Zhang 0001, Xin Tan, Min Yang 0002, Zhemin Yang |
BScout: Direct Whole Patch Presence Test for Java Executables. |
USENIX Security Symposium |
2020 |
DBLP BibTeX RDF |
|
20 | Jedediah Haile, Sage Havens |
Identifying Ubiquitious Third-Party Libraries in Compiled Executables Using Annotated and Translated Disassembled Code with Supervised Machine Learning. |
SP (Workshops) |
2020 |
DBLP DOI BibTeX RDF |
|
20 | Ryuto Omachi, Yasuyuki Murakami |
Packer Identification Method for Multi-layer Executables with k-Nearest Neighbor of Entropies. |
ISITA |
2020 |
DBLP BibTeX RDF |
|
20 | Yaniv David |
Similarity in Binary Executables. |
|
2020 |
RDF |
|
20 | Zhuo Zhang 0002, Wei You, Guanhong Tao 0001, Guannan Wei 0001, Yonghwi Kwon 0001, Xiangyu Zhang 0001 |
BDA: practical dependence analysis for binary executables by unbiased whole-program path sampling and per-path abstract interpretation. |
Proc. ACM Program. Lang. |
2019 |
DBLP DOI BibTeX RDF |
|
20 | Roee Leon, Michael Kiperberg, Anat Anatey Leon Zabag, Amit Resh, Asaf Algawi, Nezer J. Zaidenberg |
Hypervisor-Based White Listing of Executables. |
IEEE Secur. Priv. |
2019 |
DBLP DOI BibTeX RDF |
|
20 | Chariton Karamitas, Athanasios Kehagias |
Function matching between binary executables: efficient algorithms and features. |
J. Comput. Virol. Hacking Tech. |
2019 |
DBLP DOI BibTeX RDF |
|
20 | Emre Güler, Cornelius Aschermann, Ali Abbasi 0002, Thorsten Holz |
AntiFuzz: Impeding Fuzzing Audits of Binary Executables. |
USENIX Security Symposium |
2019 |
DBLP BibTeX RDF |
|
Displaying result #1 - #100 of 355 (100 per page; Change: ) Pages: [ 1][ 2][ 3][ 4][ >>] |
|