메뉴 건너뛰기




Volumn 5123 LNCS, Issue , 2008, Pages 423-427

Jakstab: A static analysis platform for binaries - Tool paper

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER AIDED ANALYSIS; MODEL CHECKING; STATIC ANALYSIS;

EID: 48949099057     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-70545-1_40     Document Type: Conference Paper
Times cited : (99)

References (10)
  • 1
    • 48949092978 scopus 로고    scopus 로고
    • Balakrishnan, G., Reps, T., Melski, D., Teitelbaum, T.: WYSINWYX: What You See Is Not What You eXecute. In: VSTTE, Zurich, Switzerland (2005)
    • Balakrishnan, G., Reps, T., Melski, D., Teitelbaum, T.: WYSINWYX: What You See Is Not What You eXecute. In: VSTTE, Zurich, Switzerland (2005)
  • 2
    • 34547150779 scopus 로고    scopus 로고
    • Gulavani, B., Henzinger, T., Kannan, Y., Nori, A., Rajamani, S.: SYNERGY: a new algorithm for property checking. In: SIGSOFT FSE 2006, pp. 117-127. ACM, New York (2006)
    • Gulavani, B., Henzinger, T., Kannan, Y., Nori, A., Rajamani, S.: SYNERGY: a new algorithm for property checking. In: SIGSOFT FSE 2006, pp. 117-127. ACM, New York (2006)
  • 3
    • 26444526878 scopus 로고    scopus 로고
    • Detecting malicious code by model checking
    • Julisch, K, Krügel, C, eds, DIMVA 2005, Springer, Heidelberg
    • Kinder, J., Katzenbeisser, S., Schallhart, C., Veith, H.: Detecting malicious code by model checking. In: Julisch, K., Krügel, C. (eds.) DIMVA 2005. LNCS, vol. 3548, pp. 174-187. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3548 , pp. 174-187
    • Kinder, J.1    Katzenbeisser, S.2    Schallhart, C.3    Veith, H.4
  • 4
    • 14344262813 scopus 로고    scopus 로고
    • Linn, C., Debray, S.: Obfuscation of executable code to improve resistance to static disassembly. In: CCS 2003, pp. 290-299. ACM, New York (2003)
    • Linn, C., Debray, S.: Obfuscation of executable code to improve resistance to static disassembly. In: CCS 2003, pp. 290-299. ACM, New York (2003)
  • 5
    • 35048896043 scopus 로고    scopus 로고
    • Balakrishnan, G., Reps, T.: Analyzing memory accesses in x86 executables. In: Duesterwald, E. (ed.) CC 2004. LNCS, 2985, pp. 5-23. Springer, Heidelberg (2004)
    • Balakrishnan, G., Reps, T.: Analyzing memory accesses in x86 executables. In: Duesterwald, E. (ed.) CC 2004. LNCS, vol. 2985, pp. 5-23. Springer, Heidelberg (2004)
  • 6
    • 47249123745 scopus 로고    scopus 로고
    • Analyzing stripped device-driver executables
    • TACAS, Springer, Heidelberg
    • Balakrishnan, G., Reps, T.: Analyzing stripped device-driver executables. In: TACAS 2008. LNCS, pp. 124-140. Springer, Heidelberg (2008)
    • (2008) LNCS , pp. 124-140
    • Balakrishnan, G.1    Reps, T.2
  • 8
    • 18144399312 scopus 로고    scopus 로고
    • Using a decompiler for real-world source recovery. In: WCRE
    • Los Alamitos
    • van Emmerik, M., Waddington, T.: Using a decompiler for real-world source recovery. In: WCRE 2004, pp. 27-36. IEEE Computer Society, Los Alamitos (2004)
    • (2004) 27-36. IEEE Computer Society , pp. 2004
    • van Emmerik, M.1    Waddington, T.2
  • 9
    • 33749847859 scopus 로고    scopus 로고
    • Chang, B., Harren, M., Necula, G.: Analysis of low-level code using cooperating decompilers. In: Yi, K. (ed.) SAS 2006. LNCS, 4134, pp. 318-335. Springer, Heidelberg (2006)
    • Chang, B., Harren, M., Necula, G.: Analysis of low-level code using cooperating decompilers. In: Yi, K. (ed.) SAS 2006. LNCS, vol. 4134, pp. 318-335. Springer, Heidelberg (2006)
  • 10
    • 0031619196 scopus 로고    scopus 로고
    • Specifying the semantics of machine instructions
    • IEEE Computer Society, Los Alamitos
    • Cifuentes, C., Sendall, S.: Specifying the semantics of machine instructions. In: International Workshop on Program Comprehension (IWPC 1998), pp. 126-133. IEEE Computer Society, Los Alamitos (1998)
    • (1998) International Workshop on Program Comprehension (IWPC , pp. 126-133
    • Cifuentes, C.1    Sendall, S.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.