Author:
Zhang Mengyuan,Xin Yue,Wang Lingyu,Jajodia Sushil,Singhal Anoop
Publisher
Springer International Publishing
Reference47 articles.
1. Interactive disassembler.
https://www.hex-rays.com/products/ida/
2. Open hub (2017).
https://www.openhub.net/
3. Baker, B.S.: A program for identifying duplicated code. Comput. Sci. Stat. 24, 49 (1993)
4. Baker, B.S.: On finding duplication and near-duplication in large software systems. In: Proceedings of 2nd Working Conference on Reverse Engineering, pp. 86–95. IEEE (1995)
5. Bartel, A., Klein, J., Le Traon, Y., Monperrus, M.: Automatically securing permission-based software by reducing the attack surface: an application to Android. In: Proceedings of the 27th IEEE/ACM International Conference on Automated Software Engineering, pp. 274–277. ACM (2012)
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献