共 50 条
- [1] Anatomy of Exploit Code in Non-Executable Files using Virtualization THIRD 2008 INTERNATIONAL CONFERENCE ON CONVERGENCE AND HYBRID INFORMATION TECHNOLOGY, VOL 2, PROCEEDINGS, 2008, : 574 - 577
- [2] Making the Non-executable ACATS Tests Executable SIGADA 2011: PROCEEDINGS OF THE 2011 ACM INTERNATIONAL CONFERENCE ON ADA AND RELATED TECHNOLOGIES, 2011, : 75 - 80
- [3] Retrieving Self-executable and Functionally Correct Code to Improve Source Code Search 2017 24TH ASIA-PACIFIC SOFTWARE ENGINEERING CONFERENCE (APSEC 2017), 2017, : 749 - 750
- [4] Probabilistic Alias Analysis of Executable Code International Journal of Parallel Programming, 2011, 39 : 663 - 693
- [6] Speculative alias analysis for executable code 2002 INTERNATIONAL CONFERENCE ON PARALLEL ARCHITECTURES AND COMPILATION TECHNIQUES, PROCEEDINGS, 2002, : 222 - 231
- [7] STANDARDS FOR NON-EXECUTABLE SPECIFICATION LANGUAGES COMPUTER JOURNAL, 1992, 35 (06): : 567 - 573
- [8] Differential compression of executable code DCC 2007: DATA COMPRESSION CONFERENCE, PROCEEDINGS, 2007, : 103 - +
- [9] Disassembly of executable code revisited NINTH WORKING CONFERENCE ON REVERSE ENGINEERING, PROCEEDINGS, 2002, : 45 - 54
- [10] Analysis of complexity metrics of a software code for obfuscating transformations of an executable code XII INTERNATIONAL SCIENTIFIC AND RESEARCH CONFERENCE TOPICAL ISSUES IN AERONAUTICS AND ASTRONAUTICS, 2016, 155