1. N. Rosenblum, X. Zhu, B. P. Miller, and K. Hunt, “Learning to Analyze Binary Computer Code,” in Proceedings of the Twenty-Third Conference on Artificial Intelligence (AAAI-08), Chicago, IL, 2008 2. T. Bao, J. Burket, M. Woo, R. Turner,D. Brumley, “Byteweight: Learning to Recognize Functions in Binary Code,” inProceedings of the 23rd USENIX Conference on Security Symposium, pp. 845-860, 2014 3. S. Wang, P. Wang,D. Wu, “Semantics-Aware Machine Learning for Function Recognition in Binary Code,” in Proceedings of 2017 IEEE International Conference on Software Maintenance and Evolution (ICSME), pp. 388-398, 2017 4. J. Qiu, X. Su,P. Ma, “Identifying Functions in Binary Code with Reverse Extended Control Flow Graphs,” Journal of Software: Evolution and Process, Vol. 27, No. 10, pp. 793-820, 2015 5. “Keras: The Python Deep Learning Library,”(https://keras.io, last accessed on January 1, 2019) 6. “Tensorflow: An Open Source Machine Learning Framework for Everyone,”(https://www.tensorflow.org, last accessed on January 1, 2019) 7. “Exeinfo PE: A Packer, Compressor Detector,” (http://exeinfo.atwebpages.com, last accessed on January 1, 2019 8. J. Kinder and H. Veith, “Jakstab: A Static Analysis Platform for Binaries,” inProceedings of International Conference on Computer Aided Verification, pp. 423-427, Springer, 2008 9. “The MASM32 SDK,” (http://www.masm32.net/, last accessed on January 1, 2019 10. M. A Laurenzano, M. M. Tikir, L. Carrington,A. Snavely, Carrington, and A. Snavely, “Pebil: Efficient Static Binary Instrumentation for Linux,” in Proceedings of 2010 IEEE International Symposium on Performance Analysis of Systems & Software (ISPASS), pp. 175-183, 2010 11. S. Nanda, W. Li, L. Lam,T. Chiueh, “Bird: Binary Interpretation using Runtime Disassembly,” in Proceedings of the International Symposium on Code Generation and Optimization, pp. 358-370, IEEE Computer Society, 2006 12. B. Schwarz, S. Debray, G. Andrews, and M. Legendre, “PLTO: A Link-time Optimizer for the Intel IA-32 Architecture,” in Proceedings of 2001 Workshop on Binary Translation (WBT-2001), 2001 13. M. Prasad and T. Chiueh, “A Binary Rewriting Defense Against Stack based Buffer Overflow Attacks,” in Proceedings of USENIX Annual Technical Conference, General Track, pp. 211-224, 2003 14. M. Smithson, K. An, A. Kotha, K. Elwazeer, N. Giles,R. Barua, “Binary Rewriting Without Relocation Information,” University of Maryland, Tech. Rep, 2010 15. B. Schwarz, S. Debray,G. Andrews, “Disassembly of Executable Code Revisited,” in Proceedings of 2002 Ninth Working Conference on Reverse Engineering, pp. 45-54, IEEE, 2002 16. R. Wartell, Y. Zhou, K. W Hamlen, M. Kantarcioglu,B. Thuraisingham, “Differentiating Code from Data in x86 Binaries,”Machine Learning and Knowledge Discovery in Databases, pp. 522-536, Springer, 2011 17. C. Kruegel, W. Robertson, F. Valeur,G. Vigna, “Static Disassembly of Obfuscated Binaries,” in Proceedings of the 13th Conference on USENIX Security Symposium, Vol. 13, pp. 18, 2004 18. L. C. Harris and B. P. Miller, “Practical Analysis of Stripped Binary Code,” in Proceedings of Workshop on Binary Instrumentation and Applications (WBIA2005), 2005 19. “The IDA Pro Disassembler and Debugger,”(https://www.hex-rays.com/products/ida/index.shtml, last accessed on January 1, 2019) |