Author:
Adhikari Ashish,Kulkarni Prasad A.
Publisher
Springer International Publishing
Reference39 articles.
1. Alrabaee, S., et al.: Compiler provenance attribution. In: Alrabaee, S., et al. (eds.) Binary Code Fingerprinting for Cybersecurity. ADIS, vol. 78, pp. 45–78. Springer, Cham (2020). https://doi.org/10.1007/978-3-030-34238-8_3
2. Alrabaee, S., Wang, L., Debbabi, M.: BinGold: towards robust binary analysis by extracting the semantics of binary code as semantic flow graphs (SFGs). Digit. Investig. 18, S11–S22 (2016)
3. Lecture Notes in Computer Science;G Antal,2020
4. Arghire, G.: Detect packers, cryptors and compilers bundled with PE executables with the help of this reliable piece of software that boasts a high detection rate (2017). https://www.softpedia.com/get/Programming/Packers-Crypters-Protectors/PEiD-updated.shtml
5. Austin, T.H., Filiol, E., Josse, S., Stamp, M.: Exploring hidden Markov models for virus analysis: a semantic approach. In: 2013 46th Hawaii International Conference on System Sciences, pp. 5039–5048 (2013)
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献