[1] |
WANG Z , PIERCE K , MCFARLING S . BMAT-a binary matching tool for stale profile propagation[J]. The Journal of Instruction-Level Parallelism (JILP), 2000,2: 1-20.
|
[2] |
FLAKE H , . Structural comparison of executable objects[C]// Dortmund GI SIG SIDAR Workshop, 2004.
|
[3] |
潘璠, 吴礼发, 孙传鲁 ,等. 一种改进的补丁比较模型的研究与实现[J]. 南京邮电大学学报(自然科学版), 2012,32(2): 75-83.
|
|
PAN F , WU L F , SUN C L ,et al. Research and implementation of an improved patch comparison technique[J]. Journal of Nanjing University of Posts and Telecommunications(Natural Science), 2012,32(2): 75-83.
|
[4] |
肖雅娟 . 二进制代码函数相似度匹配技术研究[D]. 济南:山东大学, 2016.
|
|
XIAO Y J . Research on similarity matching technology of binary code function[M]. Jinan:Shandong University. 2016.
|
[5] |
LIU B C , BINGCHANG L , WEI H , CHAO Z ,et al. α Diff:cross-version binary code similarity detection with DNN[C]// IEEE ACM Automated Software Engineering (ASE’18). 2018.
|
[6] |
XU X J , LIU C , FENG Q ,et al. Neural network-based graph embedding for cross-platform binary code similarity detection[C]// The 2017 ACM SIGSAC Conference on Computer and Communications Security. 2017.
|
[7] |
王欣, 郭涛, 董国伟 ,等. 基于补丁比对的Concolic测试方法[J]. 清华大学学报(自然科学版), 2013,53(12): 1737-1742.
|
|
WANG X , GUO T , DONG G W ,et al. Concolic test method based on patch matching[J]. Journal of Tsinghua University(Science and Technology), 2013,53(12): 1737-1742.
|
[8] |
王嘉捷, 郭涛, 张普含 ,等. 基于软件代码差异分析的智能模糊测试[J]. 清华大学学报(自然科学版), 2013,53(12): 1726-1730.
|
|
WANG J J , GUO T , ZHANG P H ,et al. Intelligent fuzzy test based on software code difference analysis[J]. Journal of Tsinghua University(Science and Technology), 2013,53(12): 1726-1730.
|
[9] |
SHAHZAD M , SHAFIQ M Z , LIU A.X . A large scale exploratory analysis of software vulnerability life cycles[C]// International Conference on Software Engineering. 2012: 771-781.
|
[10] |
FREI S , MAY M , FIEDLER U ,et al. Large-scale vulnerability analysis[C]// SIGCOMM Workshop on Large-Scale Attack Defense. 2006: 131-138.
|
[11] |
BRUMLEY D , POOSANKAM P , SONG D ,et al. Automatic patch-based exploit generation is possible:techniques and implication[C]// Security & Privac. 2008.
|
[12] |
AVERY J , SPAFFORD E H . Ghost patches:fake patches for fake vulnerabilities[C]// International Conference on ICT Systems Security and Privacy Protection. 2017: 399-412.
|
[13] |
JEONG W O , CHEN S . Binary and anti-binary comparison[C]// XCon Information Security Conference. 2013: 1-27.
|
[14] |
DEBIN G , MICHAEL K R , DAWN S . BinHunt:automatically finding semantic differences in binary programs[C]// The 10th International Conference on Information and Communications Security. 2008.
|
[15] |
LANNAN L , JIANG M , DINGHAO W ,et al. Semantics-based obfuscation-resilient binary code similarity comparison with applications to software plagiarism detection[J]. IEEE Transactions on Software Engineering, 2017,43(12): 1157-1177.
|
[16] |
ZHENG Z X , BIHUAN C , MAHINTHAN C , LIU Y ,et al. SPAIN:security patch analysis for binaries towards understanding the pain and pills[C]// The 39th International Conference on Software Engineering. 2017.
|
[17] |
CAO Y , WEI Q , WANG Q X . Research on parallel symbolic execution through program dependence analysis[C]// The Fifth International Symposium on Computational Intelligence and Design. 2012: 222-226.
|