Author:
Sujanani Anish,Vignesh K. M. Manoj
Publisher
Springer International Publishing
Reference14 articles.
1. Banescu, S., Ahmadvand, M., Pretschner, A., Shield, R., Hamilton, C.: Detecting patching of executables without system calls. In: Proceedings of the Seventh ACM on Conference on Data and Application Security and Privacy. CODASPY 2017, pp. 185–196. Association for Computing Machinery, New York (2017). https://doi.org/10.1145/3029806.3029835
2. Brooks, T.N.: Survey of automated vulnerability detection and exploit generation techniques in cyber reasoning systems. CoRR abs/1702.06162 (2017). http://arxiv.org/abs/1702.06162
3. Feng, Q., et al.: Learning binary representation for automatic patch detection. In: 2019 16th IEEE Annual Consumer Communications Networking Conference (CCNC), pp. 1–6 (2019)
4. Hosseinzadeh, S., et al.: Diversification and obfuscation techniques for software security: a systematic literature review. Inf. Softw. Technol. (2018). https://doi.org/10.1016/j.infsof.2018.07.007
5. Jakubowski, M., Saw, C., Venkatesan, R.: Tamper-tolerant software: modeling and implementation, pp. 125–139 (2009). https://doi.org/10.1007/978-3-642-04846-3_9