共 6 条
[1]
Exploiting software how to breakcode. Greg Hoglund,Gary McGraw. . 2004
[2]
Comparing binaries with graph isomorphism. Sabin T. .http://razor.bindview.com/publish/papers/comparing-bina-ries.html . 2004
[3]
BMAT-A binary matching toolfor stale profile propagation. Wang Z,,Pierce K,McFarling S. The Journal of Instruction-LevelParallelism(JILP) . 2000
[4]
An automated binary security update system forfreeBSD. Colin Percival. .http://www.daemonology.net/freebsdup-date/binup.pdf . 2003
[5]
Graph-based comparison of execu-table objects. Thomas Dullien,Rolf Rolles. http://www.sabre-security.com/fi-les/BinDiffSSTIC05.pdf . 2005
[6]
Structural comparison of executable objects. Halvar Flake. http://www.sabre-security.com/files/dimva_paper2pdf . 2004