咨询与建议

限定检索结果

文献类型

  • 9 篇 会议
  • 8 篇 期刊文献

馆藏范围

  • 17 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 17 篇 工学
    • 12 篇 计算机科学与技术...
    • 4 篇 电气工程
    • 3 篇 信息与通信工程
    • 3 篇 软件工程
    • 1 篇 网络空间安全
  • 3 篇 管理学
    • 3 篇 公共管理

主题

  • 17 篇 binary program a...
  • 7 篇 reverse engineer...
  • 5 篇 digital forensic...
  • 3 篇 malware forensic...
  • 2 篇 programming anal...
  • 2 篇 software composi...
  • 2 篇 static analysis
  • 2 篇 vulnerability di...
  • 2 篇 compiler provena...
  • 2 篇 function identif...
  • 1 篇 ethical hacking
  • 1 篇 target program a...
  • 1 篇 emulators
  • 1 篇 penetration test...
  • 1 篇 software module ...
  • 1 篇 control flow gra...
  • 1 篇 code protection
  • 1 篇 operating system...
  • 1 篇 instruments
  • 1 篇 component

机构

  • 4 篇 concordia univ c...
  • 1 篇 kyungnam univ de...
  • 1 篇 psl univ univ pa...
  • 1 篇 univ southern ca...
  • 1 篇 catarc intellige...
  • 1 篇 univ southern ca...
  • 1 篇 budapest univ te...
  • 1 篇 arizona state un...
  • 1 篇 dga ca 90046 usa
  • 1 篇 natl univ def te...
  • 1 篇 univ calif santa...
  • 1 篇 automot data chi...
  • 1 篇 information scie...
  • 1 篇 shanghai jiao to...
  • 1 篇 quarkslab sa 13 ...
  • 1 篇 shanghai jiao to...
  • 1 篇 univ paris 1 pan...
  • 1 篇 state key lab ma...
  • 1 篇 concordia univ c...

作者

  • 5 篇 debbabi mourad
  • 5 篇 wang lingyu
  • 4 篇 shirani paria
  • 3 篇 alrabaee saed
  • 2 篇 rahimian ashkan
  • 2 篇 gu dawu
  • 2 篇 hauser christoph...
  • 2 篇 hu yikun
  • 2 篇 zhang yuanyuan
  • 2 篇 alrbaee saed
  • 1 篇 mirkovic jelena
  • 1 篇 zhang yanan
  • 1 篇 wang ruoyu
  • 1 篇 aram galstyan
  • 1 篇 zahabizadeh spen...
  • 1 篇 feng chao
  • 1 篇 buttyan levente
  • 1 篇 ma chao
  • 1 篇 menon jayakrishn...
  • 1 篇 shoshitaishvili ...

语言

  • 14 篇 英文
  • 3 篇 其他
检索条件"主题词=Binary Program Analysis"
17 条 记 录,以下是11-20 订阅
排序:
binary Code Clone Detection across Architectures and Compiling Configurations  25
Binary Code Clone Detection across Architectures and Compili...
收藏 引用
25th IEEE/ACM International Conference on program Comprehension (ICPC)
作者: Hu, Yikun Zhang, Yuanyuan Li, Juanru Gu, Dawu Shanghai Jiao Tong Univ Shanghai Peoples R China
binary code clone detection (or similarity comparison) is a fundamental technique for many important applications, such as plagiarism detection, malware analysis, software vulnerability assessment and program comprehe... 详细信息
来源: 评论
Comparing Control Flow Graphs of binary programs through Match Propagation  38
Comparing Control Flow Graphs of Binary Programs through Mat...
收藏 引用
IEEE 38th Annual International Computers, Software and Applications Conference (COMPSAC)
作者: Lim, Hyun-il Kyungnam Univ Dept Comp Engn Gyeongsangnam Do South Korea
In this paper, we present an approach to comparing control flow graphs of binary programs by matching their basic blocks. We first set up an initial match and propagate it to reach a stable state. We consider the matc... 详细信息
来源: 评论
BinComp: A stratified approach to compiler provenance Attribution
BinComp: A stratified approach to compiler provenance Attrib...
收藏 引用
15th Annual DFRWS Conference (DFRWS USA)
作者: Rahimian, Ashkan Shirani, Paria Alrbaee, Saed Wang, Lingyu Debbabi, Mourad Concordia Univ Concordia Inst Informat Syst Engn Comp Secur Lab Montreal PQ Canada
Compiler provenance encompasses numerous pieces of information, such as the compiler family, compiler version, optimization level, and compiler-related functions. The extraction of such information is imperative for v... 详细信息
来源: 评论
SIGMA: A Semantic Integrated Graph Matching Approach for identifying reused functions in binary code
<i>SIGMA</i>: A Semantic Integrated Graph Matching Approach ...
收藏 引用
DFRWS Europe Proceedings of the Second Annual DFRWS Europe
作者: Alrabaee, Saed Shirani, Paria Wang, Lingyu Debbabi, Mourad Concordia Univ Concordia Inst Informat Syst Engn Comp Secur Lab Montreal PQ Canada
The capability of efficiently recognizing reused functions for binary code is critical to many digital forensics tasks, especially considering the fact that many modern malware typically contain a significant amount o... 详细信息
来源: 评论
DeMal: Module decomposition of malware based on community discovery
收藏 引用
COMPUTERS & SECURITY 2022年 117卷 1页
作者: Huang, Yuyao Shu, Hui Kang, Fei State Key Lab Math Engn & Adv Comp Zhengzhou 450000 Peoples R China
In recent years, malware has grown faster than ever in volume, form and harmfulness. While existing static or dynamic analysis techniques can meet the common user needs for malware detection, ana -lysts desire a more ... 详细信息
来源: 评论
SIGMA: A Semantic Integrated Graph Matching Approach for identifying reused functions in binary code
收藏 引用
DIGITAL INVESTIGATION 2015年 第S1期12卷 S61-S71页
作者: Alrabaee, Saed Shirani, Paria Wang, Lingyu Debbabi, Mourad Concordia Univ Concordia Inst Informat Syst Engn Comp Secur Lab Montreal PQ Canada
The capability of efficiently recognizing reused functions for binary code is critical to many digital forensics tasks, especially considering the fact that many modern malware typically contain a significant amount o... 详细信息
来源: 评论
IoT Hacking - A Primer
INFOCOMMUNICATIONS JOURNAL
收藏 引用
INFOCOMMUNICATIONS JOURNAL 2019年 第2期11卷 2-13页
作者: Papp, Dorottya Tamas, Kristof Buttyan, Levente Budapest Univ Technol & Econ Dept Networked Syst & Serv CrySyS Lab Budapest Hungary
The Internet of Things (IoT) enables many new and exciting applications, but it also creates a number of new risks related to information security. Several recent attacks on IoT devices and systems illustrate that the... 详细信息
来源: 评论