Author:
Kaichi Ryunosuke,Matsumoto Shinsuke,Kusumoto Shinji
Publisher
Springer Nature Switzerland
Reference13 articles.
1. Cen, L., Gates, C.S., Si, L., Li, N.: A probabilistic discriminative model for android malware detection with decompiled source code. Trans. Dependable Secure Comput. (TDSC) 12(4), 400–412 (2014)
2. Cifuentes, C., Gough, K.J.: Decompilation of binary programs. Softw. Pract. Experience 25(7), 811–829 (1995)
3. Cifuentes, C., Waddington, T., Van Emmerik, M.: Computer security analysis through decompilation and high-level debugging. In: Working Conference on Reverse Engineering (WCRE), pp. 375–380 (2001)
4. Falleri, J., Xavier Blanc, F.M., Martinez, M., Monperrus, M.: Fine-grained and accurate source code differencing. In: International Conference on Automated Software Engineering (ASE), pp. 313–324 (2014)
5. Harrand, N., Soto-Valero, C., Monperrus, M., Baudry, B.: The strengths and behavioral quirks of java bytecode decompilers. In: International Working Conference on Source Code Analysis and Manipulation (SCAM), pp. 92–102 (2019)