1. 2022. Learn the architecture - AArch64 Instruction Set Architecture. https://developer.arm.com/documentation/102374/latest/ 2022. Learn the architecture - AArch64 Instruction Set Architecture. https://developer.arm.com/documentation/102374/latest/
2. Daniel Arp , Erwin Quiring , Feargus Pendlebury , Alexander Warnecke , Fabio Pierazzi , Christian Wressnegger , Lorenzo Cavallaro , and Konrad Rieck . 2020. Dos and Don’ts of Machine Learning in Computer Security. CoRR, abs/2010.09470 ( 2020 ), arXiv:2010.09470. arxiv:2010.09470 Daniel Arp, Erwin Quiring, Feargus Pendlebury, Alexander Warnecke, Fabio Pierazzi, Christian Wressnegger, Lorenzo Cavallaro, and Konrad Rieck. 2020. Dos and Don’ts of Machine Learning in Computer Security. CoRR, abs/2010.09470 (2020), arXiv:2010.09470. arxiv:2010.09470
3. Tiffany Bao , Jonathan Burket , Maverick Woo , Rafael Turner , and David Brumley . 2014 . BYTEWEIGHT: Learning to recognize functions in binary code . In 23rd USENIX Security Symposium (USENIX Security 14) . 845–860. Tiffany Bao, Jonathan Burket, Maverick Woo, Rafael Turner, and David Brumley. 2014. BYTEWEIGHT: Learning to recognize functions in binary code. In 23rd USENIX Security Symposium (USENIX Security 14). 845–860.
4. Leyla Bilge , Davide Balzarotti , William Robertson , Engin Kirda , and Christopher Kruegel . 2012 . Disclosure: detecting botnet command and control servers through large-scale netflow analysis . In Proceedings of the 28th Annual Computer Security Applications Conference. Leyla Bilge, Davide Balzarotti, William Robertson, Engin Kirda, and Christopher Kruegel. 2012. Disclosure: detecting botnet command and control servers through large-scale netflow analysis. In Proceedings of the 28th Annual Computer Security Applications Conference.
5. 2022. zynamics BinDiff. https://www.zynamics.com/bindiff.html 2022. zynamics BinDiff. https://www.zynamics.com/bindiff.html