[1] |
Statista. number of apps available in leading app stores as of march 2017[EB/OL]. .
|
[2] |
SCHWARZ B , DEBRAY S , ANDREWS G . Disassembly of executable code revisited[C]// The Working Conference on Reverse Engineering. 2002: 45-54.
|
[3] |
KRUEGEL C , ROBERTSON W , VALEUR F ,et al. Static disassembly of obfuscated binaries[C]// Usenix Security Symposium. 2004: 255-270.
|
[4] |
REPS T , HORWITZ S , SAGIV M . Precise interprocedural dataflow analysis via graph reachability[C]// The 22nd ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages. 1995: 49-61.
|
[5] |
HORWITZ S , REPS T , BINKLEY D . Interprocedural slicing using dependence graphs[J]. ACM Sigplan Notices, 2004,23(7): 35-46.
|
[6] |
BRUSCHI D , MARTIGNONI L , MONGA M . Detecting self-mutating malware using control-flow graph matching[C]// The International Conference on Detection of Intrusions and Malware and Vulnerability Assessment, 2006: 129-143.
|
[7] |
CESARE S , XIANG Y . Malware variant detection using similarity search over sets of control flow graphs[C]// The International Conference on Trust,Security and Privacy in Computing and Communications. 2011: 181-189.
|
[8] |
CIFUENTES C , VAN EMMERIK M . Recovery of jump table case statements from binary code[C]// The International Workshop on Program Comprehension. 1999: 192-199.
|
[9] |
MENG X , MILLER B P . Binary code is not easy[C]// The 25th International Symposium on Software Testing and Analysis. 2016: 24-35.
|
[10] |
SUTTER B D , BUS B D , BOSSCHERE K D ,et al. On the Static Analysis of Indirect Control Transfers in Binaries[C]// The International Conference on Parallel &Distributed Processing Techniques &Applications. 2000: 1013-1019.
|
[11] |
KINDER J , ZULEGER F , VEITH H . An abstract interpretation-based framework for control flow reconstruction from binaries[C]// The International Workshop on Verification,Model Checking,and Abstract Interpretation. 2009: 214-228.
|
[12] |
TROGER J , CIFUENTES C . Analysis of virtual method invocation for binary translation[C]// The Working Conference on Reverse Engineering. 2002: 65-74.
|
[13] |
JOHNSON R , STAVROU A . Forced-path execution for android applications on x86 platforms[C]// The International Conference on Software Security and Reliability Companion. 2013: 188-197.
|
[14] |
XU L , SUN F , SU Z . Constructing Precise Control Flow Graphs from Binaries[J]. University of California. 2012.
|
[15] |
ZHAO J , . Analyzing control flow in Java bytecode[C]// The 16th Conference of Japan Society for Software Science and Technology. 1999: 313-316.
|
[16] |
胡刚, 张平, 李清宝 ,等. 基于静态模拟的二进制控制流恢复算法[J]. 计算机工程, 2011,37(5): 276-278.
|
|
HU G , ZHANG P , LI Q B ,et al. Control flow restoring algorithm for binary program based on static simulation[J]. Computer Enginerring, 2011,37(5): 276-278.
|
[17] |
张雁, 林英 . 程序控制流图自动生成的算法[J]. 计算机与数字工程, 2010,38(2): 28-30.
|
|
ZHANG Y , LIN Y . Automatic generation algorithm of the control flow graph[J]. Computer &Digital Engineering, 2010,38(2): 28-30.
|
[18] |
ARZT S , RASTHOFER S , FRITZ C ,et al. FlowDroid:precise context,flow,field,object-sensitive and lifecycle-aware taint analysis for android Apps[J]. ACM Sigplan Notices, 2014,49(6): 259-269.
|
[19] |
LI L , BARTEL A , BISSYANDE T F ,et al. Iccta:Detecting inter-component privacy leaks in android Apps[C]// The International Conference on Software Engineering. 2015: 280-291.
|
[20] |
WEI F , ROY S , OU X . Amandroid:a precise and general inter-component data flow analysis framework for security vetting of android apps[C]// The 2014 ACM SIGSAC Conference on Computer and Communications Security. 2014: 1329-1341.
|
[21] |
辛纳(美) . Android C++高级编程——使用NDK[M]. 北京: 清华大学出版社, 2013.
|
|
CINAR O . Pro Android C++ wih the NDK[M]. Beijing: Tsinghua University PressPress, 2013.
|
[22] |
Angr. Intermediate Representation[EB/OL]. .
|
[23] |
NETHERCOTE N , SEWARD J . Valgrind:a framework for heavyweight dynamic binary instrumentation[J]. Acm Sigplan Notices, 2007,42(6): 89-100.
|
[24] |
YAN S , WANG R , HAUSER C ,et al. Firmalice-automatic detection of authentication bypass vulnerabilities in binary firmware[C]// The Network and Distributed System Security Symposium, 2015.
|
[25] |
SHOSHITAISHVILI Y , WANG R , SALLS C ,et al. SOK:(State of) the art of war:offensive techniques in binary analysis[C]// Security and Privacy. 2016: 138-157.
|