相关参考文献
注意:仅列出部分参考文献,下载原文获取全部文献信息。A Survey of Binary Code Similarity
Irfan Ul Haq et al.
ACM COMPUTING SURVEYS (2022)
An Automated Vision-Based Deep Learning Model for Efficient Detection of Android Malware Attacks
Iman Almomani et al.
IEEE ACCESS (2022)
DeMal: Module decomposition of malware based on community discovery
Yuyao Huang et al.
COMPUTERS & SECURITY (2022)
Software Module Clustering: An In-Depth Literature Analysis
Qusay Sarhan et al.
IEEE TRANSACTIONS ON SOFTWARE ENGINEERING (2022)
Android malware analysis in a nutshell
Iman Almomani et al.
PLOS ONE (2022)
ModX: Binary Level Partially Imported Third-Party Library Detection via Program Modularization and Semantic Matching
Can Yang et al.
2022 ACM/IEEE 44TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING (ICSE 2022) (2022)
Visualized Malware Multi-Classification Framework Using Fine-Tuned CNN-Based Transfer Learning Models
Walid El-Shafai et al.
APPLIED SCIENCES-BASEL (2021)
PALMTREE: Learning an Assembly Language Model for Instruction Embedding
Xuezixiang Li et al.
CCS '21: PROCEEDINGS OF THE 2021 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (2021)
Software Vulnerability Detection Using Deep Neural Networks: A Survey
Guanjun Lin et al.
PROCEEDINGS OF THE IEEE (2020)
DEEPBINDIFF: Learning Program-Wide Code Representations for Binary Diffing
Yue Duan et al.
27TH ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2020) (2020)
Revisiting the Challenges and Opportunities in Software Plagiarism Detection
Xi Xu et al.
PROCEEDINGS OF THE 2020 IEEE 27TH INTERNATIONAL CONFERENCE ON SOFTWARE ANALYSIS, EVOLUTION, AND REENGINEERING (SANER '20) (2020)
Accurate and Scalable Cross-Architecture Cross-OS Binary Code Search with Emulation
Yinxing Xue et al.
IEEE TRANSACTIONS ON SOFTWARE ENGINEERING (2019)
Software Clusterings with Vector Semantics and the Call Graph
Marios Papachristou
ESEC/FSE'2019: PROCEEDINGS OF THE 2019 27TH ACM JOINT MEETING ON EUROPEAN SOFTWARE ENGINEERING CONFERENCE AND SYMPOSIUM ON THE FOUNDATIONS OF SOFTWARE ENGINEERING (2019)
Asm2Vec: Boosting Static Representation Robustness for Binary Clone Search against Code Obfuscation and Compiler Optimization
Steven H. H. Ding et al.
2019 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2019) (2019)
SAFE: Self-Attentive Function Embeddings for Binary Similarity
Luca Massarelli et al.
DETECTION OF INTRUSIONS AND MALWARE, AND VULNERABILITY ASSESSMENT (DIMVA 2019) (2019)
Identifying key classes in object-oriented software using generalized k-core decomposition
Weifeng Pan et al.
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2018)
BinGo: Cross-Architecture Cross-OS Binary Search
Mahinthan Chandramohan et al.
FSE'16: PROCEEDINGS OF THE 2016 24TH ACM SIGSOFT INTERNATIONAL SYMPOSIUM ON FOUNDATIONS OF SOFTWARE ENGINEERING (2016)
A Generic Approach to Automatic Deobfuscation of Executable Code
Babak Yadegari et al.
2015 IEEE SYMPOSIUM ON SECURITY AND PRIVACY SP 2015 (2015)
Fast unfolding of communities in large networks
Vincent D. Blondel et al.
JOURNAL OF STATISTICAL MECHANICS-THEORY AND EXPERIMENT (2008)
Fast algorithm for detecting community structure in networks
MEJ Newman
PHYSICAL REVIEW E (2004)