[15] |
BAO T , BURKET J , WOO M ,et al. BYTEWEIGHT:learning to recognize functions in binary code[C]// The 23rd USENIX Security Symposium. 2014: 845-860.
|
[16] |
段钢 . 加密与解密 (第四版)[M]. 北京: 电子工业出版社, 2018: 104-105.
|
|
DUAN G . Encryption and decryption (4th edition)[M]. Beijing: Publishing House of Electronics IndustryPress, 2018: 104-105.
|
[17] |
YIN X , LIU S , LIU L ,et al. Function recognition in stripped binary of embedded devices[J]. IEEE Access, 2018,6: 75682-75694.
|
[18] |
HU X , CHIUEH T , SHIN K G . Large-scale malware indexing using function-call graphs[C]// The 16th ACM Conference on Computer and communications security. 2009: 611-620.
|
[19] |
HASSEN M , CHAN P K . Scalable function call graph-based malware classification[C]// The Seventh ACM on Conference on Data and Application Security and Privacy. 2017: 239-248.
|
[20] |
HUANG D X , TANG Y , WANG Y ,et al. Toward efficient and accurate function‐call graph matching of binary codes[J]. Con-currency and Computation:Practice and Experience, 2018,31(21).
|
[21] |
KONG D , YAN G . Discriminant malware distance learning on structural information for automated malware classification[C]// The 19th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. 2013: 1357-1365.
|
[1] |
DURDEN T . Automated vulnerability auditing in machine code[J]. Phrack Magazine, 2007,64.
|
[2] |
ABADI M , BUDIU M , ERLINGSSON ú ,et al. Control-flow integrity principles,implementations,and applications[J]. ACM Transactions on Information and System Security (TISSEC), 2009,13(1):4.
|
[3] |
CLAUSE J , LI W , ORSO A . Dytan:a generic dynamic taint analysis framework[C]// International Symposium on Software Testing and Analysis. 2007: 196-206.
|
[4] |
NEWSOME J , SONG D X . Dynamic taint analysis for automatic detection,analysis,and signature generation of exploits on commodity software[C]// NDSS. 2005: 3-4.
|
[5] |
STAATS M , PASAREANU C . Parallel symbolic execution for structural test generation[C]// The 19th International Symposium on Software Testing and Analysis. 2010: 183-194.
|
[6] |
LI H , KIM T , BAT-ERDENE M ,et al. Software vulnerability detection using backward trace analysis and symbolic execution[C]// 2013 International Conference on Availability,Reliability and Security. 2013: 446-454.
|
[7] |
PERKINS J H , KIM S , LARSEN S ,et al. Automatically patching errors in deployed software[C]// The ACM SIGOPS 22nd Symposium on Operating Systems Principles. 2009: 87-102.
|
[8] |
SHACHAM H , . The geometry of innocent flesh on the bone:return-into-libc without function calls (on the x86)[C]// ACM Conference on Computer and Communications Security. 2007: 552-561.
|
[9] |
SONG D , BRUMLEY D , YIN H ,et al. BitBlaze:a new approach to computer security via binary analysis[C]// International Conference on Information Systems Security. 2008: 1-25.
|
[10] |
SHOSHITAISHVILI Y , WANG R , SALLS C ,et al. Sok:(state of) the art of war:offensive techniques in binary analysis[C]// 2016 IEEE Symposium on Security and Privacy (SP). 2016: 138-157.
|
[11] |
李珍, 邹德清, 王泽丽 ,等. 面向源代码的软件漏洞静态检测综述[J]. 网络与信息安全学报, 2019,5(1): 1-14.
|
|
LI Z , ZOU D Q , WANG Z L ,et al. Survey on static software vul-nerability detection for source code[J]. Chinese Journal of Network and Information Security, 2019,5(1): 1-14.
|
[12] |
MENG X , MILLER B P . Binary code is not easy[C]// The 25th International Symposium on Software Testing and Analysis. 2016: 24-35.
|
[13] |
CABALLERO J , JOHNSON N M , MCCAMANT S ,et al. Binary code extraction and interface identification for security applications[R]. California Univ Berkeley Dept of Electrical Engineering and Computer Science, 2009.
|
[14] |
Radare. The official radare2 book (1st edition)[EB].
|