On the feasibility of binary authorship characterization
Tài liệu tham khảo
Alrabaee, 2014, Oba2: an onion approach to binary code authorship attribution, Digit. Invest., 11, S94, 10.1016/j.diin.2014.03.012
Alrabaee, 2018, On leveraging coding habits for effective binary authorship attribution, 26
Bayer, 2009, Scalable, behavior-based malware clustering, NDSS, 9, 8
2015
A. Caliskan-Islam, F. Yamaguchi, E. Dauber, R. Harang, K. Rieck, R. Greenstadt, A. Narayanan, When Coding Style Survives Compilation: De-anonymizing Programmers from Executable Binaries, arXiv preprint arXiv:1512.08546.
Caliskan-Islam, 2015
2015
Farnstrom, 2000, Scalability for clustering algorithms revisited, ACM SIGKDD Explorations Newsletter, 2, 51, 10.1145/360402.360419
2012
Frantzeskou, 2004, 470
Glorot, 2011, Deep sparse rectifier neural networks, 315
2011
G. Huang, Z. Liu, K. Q. Weinberger, L. van der Maaten, Densely Connected Convolutional Networks, arXiv preprint arXiv:1608.06993.
Huang, 2017, Binsequence: fast, accurate and scalable binary code reuse detection, 155
Karbab, 2016, Dysign: dynamic fingerprinting for the automatic detection of android malware, 1
Kirat, 2013, Sigmal: a static signal processing based malware triage, 89
Kolosnjaji, 2016, Deep learning for classification of malware system call sequences, 137
lab, 2014
Maas, 2013
McCabe, 1976, A complexity measure, IEEE Trans. Softw. Eng., SE-2, 308, 10.1109/TSE.1976.233837
Meng, 2016, Fine-grained binary code authorship identification, 1097
Moran, 2013, vol. 11
Nagano, 2017, Static analysis with paragraph vector for malware detection, 80
Nataraj, 2011, Malware images: visualization and automatic classification, 4
Nataraj, 2013, Sarvam: search and retrieval of malware
Rahimian, 2015, Bincomp: a stratified approach to compiler provenance attribution, Digit. Invest., 14, S146, 10.1016/j.diin.2015.05.015
Rosenblum, 2011, Who wrote this code? identifying the authors of program binaries, 172
Saxe, 2015, Deep neural network based malware detection using two dimensional binary program features, 11
Schkufza, 2015
Sharma, 2016
Shin, 2015
Tate, 2009, Equality saturation: a new approach to optimization, vol. 44, 264
Taylor, 2008, Author entropy: a metric for characterization of software authorship patterns, 6
2011
reportTechniqal report, Resource 207: Kaspersky Lab Research proves that Stuxnet and Flame developers are connected, http://www.kaspersky.com/about/news/virus/2012/.
2016
2008
Tristan, 2011, Evaluating value-graph translation validation for llvm, ACM Sigplan Not., 46, 295, 10.1145/1993316.1993533
Wagner, 2017, A knowledge-assisted visual malware analysis system: design, validation, and reflection of kamas, Comput. Secur., 67, 1, 10.1016/j.cose.2017.02.003
Wei, 2016, Hcp: a flexible cnn framework for multi-label image classification, IEEE Trans. Pattern Anal. Mach. Intell., 38, 1901, 10.1109/TPAMI.2015.2491929
Woldring, 2016, Scaffoldseq: software for characterization of directed evolution populations, Proteins: Structure, Function, and Bioinformatics, 84, 869, 10.1002/prot.25040