Author:
Choi Seokwoo,Park Heewan,Lim Hyun-il,Han Taisook
Subject
Hardware and Architecture,Information Systems,Software
Reference56 articles.
1. Appel, A., 2002. Deobfuscation is in NP. Preprint available from .
2. Balakrishnan, G., 2007. WYSINWYX: What You See Is Not What You eXecute. Ph.D. Thesis, University of Wisconsin-Madison.
3. Analyzing memory accesses in x86 executables;Balakrishnan;Compounds Construction,2004
4. On the (im) possibility of obfuscating programs;Barak;Lecture Notes in Computer Science,2001
5. Static detection of malicious code in executable programs;Bergeron;International Journal of Requirements Engineering,2001
Cited by
33 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Accurate and Language Agnostic Code Clone Detection by Measuring Edit Distance of ANTLR Parse Tree;International Journal of Software Innovation;2022-05-06
2. Scaling Up Software Birthmarks Using Fuzzy Hashing;Research Anthology on Recent Trends, Tools, and Implications of Computer Programming;2021
3. Plagiarism Detection of Multi-threaded Programs Using Frequent Behavioral Pattern Mining;International Journal of Software Engineering and Knowledge Engineering;2020-11
4. Modelling Features-Based Birthmarks for Security of End-to-End Communication System;Security and Communication Networks;2020-06-29
5. Semantic code search via equational reasoning;Proceedings of the 41st ACM SIGPLAN Conference on Programming Language Design and Implementation;2020-06-06