-
1
-
-
48949092978
-
-
Balakrishnan, G., Reps, T., Melski, D., Teitelbaum, T.: WYSINWYX: What You See Is Not What You eXecute. In: VSTTE, Zurich, Switzerland (2005)
-
Balakrishnan, G., Reps, T., Melski, D., Teitelbaum, T.: WYSINWYX: What You See Is Not What You eXecute. In: VSTTE, Zurich, Switzerland (2005)
-
-
-
-
2
-
-
34547150779
-
-
Gulavani, B., Henzinger, T., Kannan, Y., Nori, A., Rajamani, S.: SYNERGY: a new algorithm for property checking. In: SIGSOFT FSE 2006, pp. 117-127. ACM, New York (2006)
-
Gulavani, B., Henzinger, T., Kannan, Y., Nori, A., Rajamani, S.: SYNERGY: a new algorithm for property checking. In: SIGSOFT FSE 2006, pp. 117-127. ACM, New York (2006)
-
-
-
-
3
-
-
26444526878
-
Detecting malicious code by model checking
-
Julisch, K, Krügel, C, eds, DIMVA 2005, Springer, Heidelberg
-
Kinder, J., Katzenbeisser, S., Schallhart, C., Veith, H.: Detecting malicious code by model checking. In: Julisch, K., Krügel, C. (eds.) DIMVA 2005. LNCS, vol. 3548, pp. 174-187. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3548
, pp. 174-187
-
-
Kinder, J.1
Katzenbeisser, S.2
Schallhart, C.3
Veith, H.4
-
4
-
-
14344262813
-
-
Linn, C., Debray, S.: Obfuscation of executable code to improve resistance to static disassembly. In: CCS 2003, pp. 290-299. ACM, New York (2003)
-
Linn, C., Debray, S.: Obfuscation of executable code to improve resistance to static disassembly. In: CCS 2003, pp. 290-299. ACM, New York (2003)
-
-
-
-
5
-
-
35048896043
-
-
Balakrishnan, G., Reps, T.: Analyzing memory accesses in x86 executables. In: Duesterwald, E. (ed.) CC 2004. LNCS, 2985, pp. 5-23. Springer, Heidelberg (2004)
-
Balakrishnan, G., Reps, T.: Analyzing memory accesses in x86 executables. In: Duesterwald, E. (ed.) CC 2004. LNCS, vol. 2985, pp. 5-23. Springer, Heidelberg (2004)
-
-
-
-
6
-
-
47249123745
-
Analyzing stripped device-driver executables
-
TACAS, Springer, Heidelberg
-
Balakrishnan, G., Reps, T.: Analyzing stripped device-driver executables. In: TACAS 2008. LNCS, pp. 124-140. Springer, Heidelberg (2008)
-
(2008)
LNCS
, pp. 124-140
-
-
Balakrishnan, G.1
Reps, T.2
-
8
-
-
18144399312
-
Using a decompiler for real-world source recovery. In: WCRE
-
Los Alamitos
-
van Emmerik, M., Waddington, T.: Using a decompiler for real-world source recovery. In: WCRE 2004, pp. 27-36. IEEE Computer Society, Los Alamitos (2004)
-
(2004)
27-36. IEEE Computer Society
, pp. 2004
-
-
van Emmerik, M.1
Waddington, T.2
-
9
-
-
33749847859
-
-
Chang, B., Harren, M., Necula, G.: Analysis of low-level code using cooperating decompilers. In: Yi, K. (ed.) SAS 2006. LNCS, 4134, pp. 318-335. Springer, Heidelberg (2006)
-
Chang, B., Harren, M., Necula, G.: Analysis of low-level code using cooperating decompilers. In: Yi, K. (ed.) SAS 2006. LNCS, vol. 4134, pp. 318-335. Springer, Heidelberg (2006)
-
-
-
-
10
-
-
0031619196
-
Specifying the semantics of machine instructions
-
IEEE Computer Society, Los Alamitos
-
Cifuentes, C., Sendall, S.: Specifying the semantics of machine instructions. In: International Workshop on Program Comprehension (IWPC 1998), pp. 126-133. IEEE Computer Society, Los Alamitos (1998)
-
(1998)
International Workshop on Program Comprehension (IWPC
, pp. 126-133
-
-
Cifuentes, C.1
Sendall, S.2
|