Author:
You Wei,Zhang Zhuo,Kwon Yonghwi,Aafer Yousra,Peng Fei,Shi Yu,Harmon Carson,Zhang Xiangyu
Cited by
11 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Define-Use Guided Path Exploration for Better Forced Execution;Proceedings of the 33rd ACM SIGSOFT International Symposium on Software Testing and Analysis;2024-09-11
2. CodeExtract: Enhancing Binary Code Similarity Detection with Code Extraction Techniques;Proceedings of the 25th ACM SIGPLAN/SIGBED International Conference on Languages, Compilers, and Tools for Embedded Systems;2024-06-20
3. DawnGNN: Documentation augmented windows malware detection using graph neural network;Computers & Security;2024-05
4. ARCTURUS
: Full Coverage Binary Similarity Analysis with Reachability-guided Emulation;ACM Transactions on Software Engineering and Methodology;2024-04-18
5. PEM: Representing Binary Program Semantics for Similarity Analysis via a Probabilistic Execution Model;Proceedings of the 31st ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering;2023-11-30