최소 단어 이상 선택하여야 합니다.
최대 10 단어까지만 선택 가능합니다.
다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
NTIS 바로가기정보과학회지 = Communications of the Korean Institute of Information Scientists and Engineers, v.36 no.3 = no.346, 2018년, pp.11 - 16
차상길 (KAIST)
초록이 없습니다.
* AI 자동 식별 결과로 적합하지 않은 문장이 있을 수 있으니, 이용에 유의하시기 바랍니다.
Y. Shoshitaishvili, R. Wang, C. Salls, N. Stephens, M. Polino, A. Dutcher, J. Grosen, S. Feng, C. Hauser, C. Kruegel, and G. Vigna, "(State of) the art of war: Offensive techniques in binary analysis," in Proceedings of the IEEE Symposium on Security and Privacy, pp. 138-157, 2016.
K. Thompson, "Reflections on trusting trust," Communications of the ACM, vol. 27, pp. 761-763, Aug. 1984.
S. Kim, M. Faerevaag, M. Jung, S. Jung, D. Oh, J. Lee, and S. K. Cha, "Testing intermediate representations for binary analysis," in Proceedings of the IEEE/ACM International Conference on Automated Software Engineering, pp. 353-364, 2017.
D. Brumley, I. Jager, T. Avgerinos, and E. J. Schwartz, "BAP: A binary analysis platform," in Proceedings of the International Conference on Computer Aided Verification, pp. 463-469, 2011.
A. Di Federico, M. Payer, and G. Agosta, "Rev.ng: A unified binary analysis framework to recover cfgs and function boundaries," pp. 131-141, 2017.
T. Dullien and S. Porst, "REIL: A platform-independent intermediate representation of disassembled code for static code analysis," 2009.
S. Bardin, P. Herrmann, J. Leroux, O. Ly, R. Tabary, and A. Vincent, "The BINCOA framework for binary code analysis," in Proceedings of the International Conference on Computer Aided Verification, pp. 165-170, 2011.
A. Djoudi and S. Bardin, "BINSEC: Binary code analysis with low-level regions," in Proceedings of the International Conference on Tools and Algorithms for the Construction and Analysis of Systems, pp. 212- 217, 2015.
D. Song, D. Brumley, H. Yin, J. Caballero, I. Jager, M. G. Kang, Z. Liang, J. Newsome, P. Poosankam, and P. Saxena, "BitBlaze: A new approach to computer security via binary analysis," in Proceedings of the International Conference on Information Systems Security, pp. 1-25, 2008.
M. V. Emmerik and T. Waddington, "Using a decompiler for real-world source recovery," in Proceedings of the Working Conference on Reverse Engineering, pp. 27-36, 2004.
E. Fleury, O. Ly, G. Point, and A. Vincent, "Insight: An open binary analysis framework," in Proceedings of the International Conference on Tools and Algorithms for the Construction and Analysis of Systems, pp. 218-224, 2015.
J. Kinder and H. Veith, "Jakstab: A static analysis platform for binaries," in Proceedings of the International Conference on Computer Aided Verification, pp. 423-427, 2008.
"Radare2." https://github.com/radare/radare2.
D. Quinlan, G. Barany, and T. Panas, "Shared and distributed memory parallel security analysis of largescale source code and binary applications," tech. rep., Lawrence Livermore National Laboratory (LLNL), 2007.
N. Nethercote and J. Seward, "Valgrind: a framework for heavyweight dynamic binary instrumentation," in Proceedings of the ACM Conference on Programming Language Design and Implementation, pp. 89-100, 2007.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.