咨询与建议

限定检索结果

文献类型

  • 27 篇 会议
  • 18 篇 期刊文献
  • 2 篇 学位论文

馆藏范围

  • 47 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 43 篇 工学
    • 37 篇 计算机科学与技术...
    • 17 篇 软件工程
    • 11 篇 电气工程
    • 6 篇 信息与通信工程
    • 2 篇 控制科学与工程
    • 1 篇 材料科学与工程(可...
  • 1 篇 理学
    • 1 篇 数学
  • 1 篇 农学
    • 1 篇 水产
  • 1 篇 管理学
    • 1 篇 公共管理

主题

  • 47 篇 binary code anal...
  • 6 篇 reverse engineer...
  • 5 篇 malware
  • 4 篇 vulnerability de...
  • 3 篇 concolic testing
  • 3 篇 static analysis
  • 3 篇 software securit...
  • 3 篇 symbolic executi...
  • 3 篇 security
  • 3 篇 malware detectio...
  • 2 篇 deep learning
  • 2 篇 belief propagati...
  • 2 篇 software metric
  • 2 篇 binary codes
  • 2 篇 machine learning
  • 2 篇 graph matching
  • 2 篇 malware analysis
  • 2 篇 network alignmen...
  • 2 篇 firmware analysi...
  • 2 篇 dynamic analysis

机构

  • 3 篇 hochiminh city u...
  • 2 篇 univ paris sacla...
  • 2 篇 concordia univ 1...
  • 2 篇 lomonosov moscow...
  • 2 篇 russian acad sci...
  • 2 篇 pennstate univer...
  • 1 篇 natl res univ hi...
  • 1 篇 samm ea 4543 uni...
  • 1 篇 russian acad sci...
  • 1 篇 russian armenian...
  • 1 篇 hochiminh city u...
  • 1 篇 south china univ...
  • 1 篇 inst rech hydro ...
  • 1 篇 univ paris 09 ps...
  • 1 篇 univ texas san a...
  • 1 篇 taiwan police co...
  • 1 篇 max planck inst ...
  • 1 篇 united arab emir...
  • 1 篇 tokyo univ agr &...
  • 1 篇 univ paris est l...

作者

  • 4 篇 debbabi mourad
  • 4 篇 nguyen minh hai
  • 4 篇 quan thanh tho
  • 4 篇 wang lingyu
  • 4 篇 alrabaee saed
  • 3 篇 shirani paria
  • 3 篇 ogawa mizuhito
  • 2 篇 qiu jing
  • 2 篇 wang shuai
  • 2 篇 stojanovic sasa
  • 2 篇 lin zhiqiang
  • 2 篇 radivojevic zaha...
  • 2 篇 bardin sebastien
  • 2 篇 marion jean-yves
  • 2 篇 benoit tristan
  • 2 篇 cvetanovic milos
  • 1 篇 ye guixin
  • 1 篇 wu dinghao
  • 1 篇 song zirui
  • 1 篇 elie mengin

语言

  • 46 篇 英文
  • 1 篇 其他
检索条件"主题词=binary code analysis"
47 条 记 录,以下是31-40 订阅
排序:
FOSSIL: A Resilient and Efficient System for Identifying FOSS Functions in Malware Binaries
收藏 引用
ACM TRANSACTIONS ON PRIVACY AND SECURITY 2018年 第2期21卷 1–34页
作者: Alrabaee, Saed Shirani, Paria Wang, Lingyu Debbabi, Mourad Concordia Univ Secur Res Ctr CIISE Montreal PQ H3G 1M8 Canada
Identifying free open-source software (FOSS) packages on binaries when the source code is unavailable is important for many security applications, such as malware detection, software infringement, and digital forensic... 详细信息
来源: 评论
An Empirical Study of SDK Credential Misuse in iOS Apps  25
An Empirical Study of SDK Credential Misuse in iOS Apps
收藏 引用
25th Asia-Pacific Software Engineering Conference (APSEC)
作者: Wen, Haohuang Li, Juanru Zhang, Yuanyuan Gu, Dawu South China Univ Technol Sch Software Engn Guangzhou Guangdong Peoples R China Shanghai Jiao Tong Univ Lab Cryptol & Comp Secur Shanghai Peoples R China
During the development of web-based mobile apps, third-party SDKs (Software Development Kit) are frequently used to facilitate the integration of certain functionality such as push notification and mobile payment. Unf... 详细信息
来源: 评论
Context-Sensitive Flow Graph and Projective Single Assignment Form for Resolving Context-Dependency of binary code  13
Context-Sensitive Flow Graph and Projective Single Assignmen...
收藏 引用
13th ACM SIGSAC Workshop on Programming Languages and analysis for Security (PLAS)
作者: Izumida, Tomonori Mori, Akira Hashimoto, Masatomo IIJ Res Lab Tokyo Japan Natl Inst Adv Ind Sci & Technol Tokyo Japan Chiba Inst Technol Narashino Chiba Japan
Program analysis on binary code is considered as difficult because one has to resolve destinations of indirect jumps. However, there is another difficulty of context-dependency that matters when one processes binary p... 详细信息
来源: 评论
Opaque Predicate: Attack and Defense in Obfuscated binary code
Opaque Predicate: Attack and Defense in Obfuscated Binary Co...
收藏 引用
作者: Xu, Dongpeng PennState University Libraries
学位级别:Doctor of Philosophy
An opaque predicate is a predicate whose value is known to the obfuscator but is difficult to deduce. It can be seamlessly applied together with other obfuscation methods such as junk code to turn reverse engineering ... 详细信息
来源: 评论
Timing Performance Profiling of Substation Control code for IED Malware Detection  2017
Timing Performance Profiling of Substation Control Code for ...
收藏 引用
3rd Annual Industrial Control System Security Workshop (ICSS)
作者: Rrushi, Julian L. Western Washington Univ Dept Comp Sci Bellingham WA 98225 USA
We present a binary static analysis approach to detect intelligent electronic device (IED) malware based on the time requirements of electrical substations. We explore graph theory techniques to model the timing perfo... 详细信息
来源: 评论
Packer identification based on metadata signature  7
Packer identification based on metadata signature
收藏 引用
7th Software Security, Protection, and Reverse Engineering Workshop (SSPREW)
作者: Nguyen Minh Hai Ogawa, Mizuhito Quan Thanh Tho HoChiMinh City Univ Technol Ho Chi Minh City Vietnam Japan Adv Inst Sci & Technol Nomi Ishikawa Japan
Malware applies lots of obfuscation techniques, which are often automatically generated by the use of packers. This paper presents a packer identification of packed code based on metadata signature, which is a frequen... 详细信息
来源: 评论
Comparison of binary Procedures: A Set of Techniques for Evading Compiler Transformations
收藏 引用
COMPUTER JOURNAL 2016年 第1期59卷 106-118页
作者: Radivojevic, Zaharije Cvetanovic, Milos Stojanovic, Sasa Univ Belgrade Sch Elect Engn Bulevar Kralja Aleksandra 73 Belgrade 11000 Serbia
License violation analysis may require digital forensics in the performance of a time-consuming search in order to find out whether a binary code of a product contains a procedure that originates from a source code fo... 详细信息
来源: 评论
Multi-threaded On-the-Fly Model Generation of Malware with Hash Compaction  1
收藏 引用
18th International Conference on Formal Engineering Methods (ICFEM)
作者: Nguyen Minh Hai Quan Thanh Tho Le Duc Anh HoChiMinh City Univ Technol Ho Chi Minh City Vietnam Tokyo Univ Agr & Technol Tokyo Japan
This paper introduces multi-threaded implementation of our binary code analyzer BE-PUM for malware. On-the-fly model generation by BE-PUM is combined with duplication detection and hash compaction method to minimize t... 详细信息
来源: 评论
Obfuscation code Localization Based on CFG Generation of Malware  8th
Obfuscation Code Localization Based on CFG Generation of Mal...
收藏 引用
8th International Symposium on Foundations and Practice of Security (FPS)
作者: Nguyen Minh Hai Ogawa, Mizuhito Quan Thanh Tho Ho Chi Minh City Univ Technol Ho Chi Minh City Vietnam Japan Adv Inst Sci & Technol Nomi Japan
This paper presents a tool BE-PUM (binary Emulator for PUshdown Model generation), which generates a precise control flow graph (CFG), under presence of typical obfuscation techniques of malware, e.g., indirect jump, ... 详细信息
来源: 评论
Incremental Verification of ω-regions on binary Control Flow Graph for Computer Virus Detection
Incremental Verification of ω-regions on Binary Control Flo...
收藏 引用
3rd National-Foundation-for-Science-and-Technology-Development Conference on Information and Computer Science (NICS)
作者: Nguyen Thien Binh Quan Thanh Tho Ha Minh Ngoc Nguyen Minh Hai HoChiMinh City Univ Technol Ho Chi Minh City Vietnam Eastern Int Univ Tx Thu Dau Mot Binh Duong Vietnam
Generally, a computer virus, or virus, consists of two major parts, including a syntactic pattern of signature and code segment performing the core malicious actions. Currently, most of commercial security programs re... 详细信息
来源: 评论